Show filters
871 Total Results
Displaying 191-200 of 871
Sort by:
Attacker Value
Unknown

CVE-2022-0618

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS or HTTP/2 PUSH_PROMISE frame where the frame contains padding information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process. Sending a HEADERS frame or PUSH_PROMISE frame with HTTP/2 padding information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crashes the server, dropping all…
Attacker Value
Unknown

CVE-2022-24737

Disclosure Date: March 07, 2022 (last updated February 23, 2025)
HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. Users are advised to upgrade. There are no known workarounds.
Attacker Value
Unknown

CVE-2022-21716

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-24573

Disclosure Date: March 03, 2022 (last updated February 23, 2025)
A stored cross-site scripting (XSS) vulnerability in the admin interface in Element-IT HTTP Commander 7.0.0 allows unauthenticated users to get admin access by injecting a malicious script in the User-Agent field.
Attacker Value
Unknown

CVE-2022-25315

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
Attacker Value
Unknown

CVE-2022-25314

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
Attacker Value
Unknown

CVE-2022-25313

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
Attacker Value
Unknown

CVE-2022-25236

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
Attacker Value
Unknown

CVE-2022-25235

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
Attacker Value
Unknown

CVE-2022-24668

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A program using swift-nio-http2 is vulnerable to a denial of service attack caused by a network peer sending ALTSVC or ORIGIN frames. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.1. This vulnerability is caused by a logical error after frame parsing but before frame handling. ORIGIN and ALTSVC frames are not currently supported by swift-nio-http2, and should be ignored. However, one code path that encounters them has a deliberate trap instead. This was left behind from the original development process and was never removed. Sending an ALTSVC or ORIGIN frame does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send one of these frames. The impact on availability is high: receiving the frame immediately crashe…