Show filters
486 Total Results
Displaying 41-50 of 486
Sort by:
Attacker Value
Unknown

CVE-2024-27316

Disclosure Date: April 04, 2024 (last updated June 07, 2024)
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
Attacker Value
Unknown

CVE-2024-24795

Disclosure Date: April 04, 2024 (last updated April 10, 2024)
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
0
Attacker Value
Unknown

CVE-2023-38709

Disclosure Date: April 04, 2024 (last updated July 30, 2024)
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
0
Attacker Value
Unknown

CVE-2024-1227

Disclosure Date: March 12, 2024 (last updated April 01, 2024)
An open redirect vulnerability, the exploitation of which could allow an attacker to create a custom URL and redirect a legitimate page to a malicious site.
0
Attacker Value
Unknown

CVE-2024-1226

Disclosure Date: March 12, 2024 (last updated April 01, 2024)
The software does not neutralize or incorrectly neutralizes certain characters before the data is included in outgoing HTTP headers. The inclusion of invalidated data in an HTTP header allows an attacker to specify the full HTTP response represented by the browser. An attacker could control the response and craft attacks such as cross-site scripting and cache poisoning attacks.
0
Attacker Value
Unknown

CVE-2021-4433

Disclosure Date: January 18, 2024 (last updated January 25, 2024)
A vulnerability was found in Karjasoft Sami HTTP Server 2.0. It has been classified as problematic. Affected is an unknown function of the component HTTP HEAD Rrequest Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250836.
Attacker Value
Unknown

CVE-2024-22087

Disclosure Date: January 05, 2024 (last updated January 12, 2024)
route in main.c in Pico HTTP Server in C through f3b69a6 has an sprintf stack-based buffer overflow via a long URI, leading to remote code execution.
Attacker Value
Unknown

CVE-2023-46918

Disclosure Date: December 27, 2023 (last updated January 06, 2024)
Phlox com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus has an Android manifest file that contains an entry with the android:allowBackup attribute set to true. This could be leveraged by an attacker with physical access to the device.
Attacker Value
Unknown

CVE-2023-46919

Disclosure Date: December 27, 2023 (last updated October 01, 2024)
Phlox com.phlox.simpleserver (aka Simple HTTP Server) 1.8 and com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus have a hardcoded aKySWb2jjrr4dzkYXczKRt7K (AES) encryption key. An attacker with physical access to the application's source code or binary can extract this key & use it decrypt the TLS secret.
Attacker Value
Unknown

CVE-2023-51771

Disclosure Date: December 25, 2023 (last updated January 04, 2024)
In MicroHttpServer (aka Micro HTTP Server) through a8ab029, _ParseHeader in lib/server.c allows a one-byte recv buffer overflow via a long URI.