Show filters
871 Total Results
Displaying 231-240 of 871
Sort by:
Attacker Value
Unknown
CVE-2021-33193
Disclosure Date: August 16, 2021 (last updated February 23, 2025)
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
0
Attacker Value
Unknown
CVE-2021-38512
Disclosure Date: August 10, 2021 (last updated February 23, 2025)
An issue was discovered in the actix-http crate before 3.0.0-beta.9 for Rust. HTTP/1 request smuggling (aka HRS) can occur, potentially leading to credential disclosure.
0
Attacker Value
Unknown
CVE-2021-33212
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
A Cross-site scripting (XSS) vulnerability in the "View in Browser" feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to inject arbitrary web script or HTML via a crafted SVG image.
0
Attacker Value
Unknown
CVE-2021-33211
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
A Directory Traversal vulnerability in the Unzip feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to write files to arbitrary directories via relative paths in ZIP archives.
0
Attacker Value
Unknown
CVE-2021-33213
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
An SSRF vulnerability in the "Upload from URL" feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to retrieve HTTP and FTP files from the internal server network by inserting an internal address.
0
Attacker Value
Unknown
CVE-2021-31618
Disclosure Date: June 15, 2021 (last updated February 22, 2025)
Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.
0
Attacker Value
Unknown
CVE-2020-35452
Disclosure Date: June 10, 2021 (last updated February 22, 2025)
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
0
Attacker Value
Unknown
CVE-2020-13938
Disclosure Date: June 10, 2021 (last updated February 22, 2025)
Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows
0
Attacker Value
Unknown
CVE-2020-13950
Disclosure Date: June 10, 2021 (last updated February 22, 2025)
Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service
0
Attacker Value
Unknown
CVE-2021-30641
Disclosure Date: June 10, 2021 (last updated February 22, 2025)
Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'
0