Show filters
871 Total Results
Displaying 291-300 of 871
Sort by:
Attacker Value
Unknown
CVE-2020-11021
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Actions Http-Client (NPM @actions/http-client) before version 1.0.8 can disclose Authorization headers to incorrect domain in certain redirect scenarios. The conditions in which this happens are if consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname Then the authorization header will get passed to the other domain. The problem is fixed in version 1.0.8.
0
Attacker Value
Unknown
CVE-2020-1967
Disclosure Date: April 21, 2020 (last updated February 21, 2025)
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
0
Attacker Value
Unknown
CVE-2020-2952
Disclosure Date: April 15, 2020 (last updated November 27, 2024)
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). The supported version that is affected is 11.1.1.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle HTTP Server accessible data as well as unauthorized read access to a subset of Oracle HTTP Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
0
Attacker Value
Unknown
CVE-2020-11709
Disclosure Date: April 12, 2020 (last updated February 21, 2025)
cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.
0
Attacker Value
Unknown
CVE-2020-1927
Disclosure Date: April 02, 2020 (last updated February 21, 2025)
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
0
Attacker Value
Unknown
CVE-2020-1934
Disclosure Date: April 01, 2020 (last updated February 21, 2025)
In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
0
Attacker Value
Unknown
CVE-2020-5280
Disclosure Date: March 25, 2020 (last updated February 21, 2025)
http4s before versions 0.18.26, 0.20.20, and 0.21.2 has a local file inclusion vulnerability. This vulnerability applies to all users of org.http4s.server.staticcontent.FileService, org.http4s.server.staticcontent.ResourceService and org.http4s.server.staticcontent.WebjarService. URI normalization is applied incorrectly. Requests whose path info contain ../ or // can expose resources outside of the configured location. This issue is patched in versions 0.18.26, 0.20.20, and 0.21.2. Note that 0.19.0 is a deprecated release and has never been supported.
0
Attacker Value
Unknown
CVE-2019-10797
Disclosure Date: February 19, 2020 (last updated February 21, 2025)
Netty in WSO2 transport-http before v6.3.1 is vulnerable to HTTP Response Splitting due to HTTP Header validation being disabled.
0
Attacker Value
Unknown
CVE-2016-1544
Disclosure Date: February 06, 2020 (last updated February 21, 2025)
nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).
0
Attacker Value
Unknown
CVE-2014-3230
Disclosure Date: January 28, 2020 (last updated February 21, 2025)
The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
0