Show filters
871 Total Results
Displaying 161-170 of 871
Sort by:
Attacker Value
Unknown

CVE-2022-36901

Disclosure Date: July 27, 2022 (last updated February 24, 2025)
Jenkins HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
Attacker Value
Unknown

CVE-2022-32213

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
Attacker Value
Unknown

CVE-2022-32215

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
Attacker Value
Unknown

CVE-2022-32214

Disclosure Date: July 14, 2022 (last updated February 24, 2025)
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
Attacker Value
Unknown

CVE-2022-31081

Disclosure Date: June 27, 2022 (last updated February 24, 2025)
HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be re…
Attacker Value
Unknown

CVE-2022-33124

Disclosure Date: June 23, 2022 (last updated February 23, 2025)
AIOHTTP 3.8.1 can report a "ValueError: Invalid IPv6 URL" outcome, which can lead to a Denial of Service (DoS). NOTE: multiple third parties dispute this issue because there is no example of a context in which denial of service would occur, and many common contexts have exception handing in the calling application
Attacker Value
Unknown

CVE-2022-30780

Disclosure Date: June 11, 2022 (last updated February 23, 2025)
Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connection_read_header_more in connections.c has a typo that disrupts use of multiple read operations on large headers.
Attacker Value
Unknown

CVE-2022-31813

Disclosure Date: June 09, 2022 (last updated February 23, 2025)
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
Attacker Value
Unknown

CVE-2022-30556

Disclosure Date: June 09, 2022 (last updated February 23, 2025)
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
Attacker Value
Unknown

CVE-2022-30522

Disclosure Date: June 09, 2022 (last updated February 23, 2025)
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.