Show filters
486 Total Results
Displaying 41-50 of 486
Sort by:
Attacker Value
Unknown
CVE-2024-27316
Disclosure Date: April 04, 2024 (last updated June 07, 2024)
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
0
Attacker Value
Unknown
CVE-2024-24795
Disclosure Date: April 04, 2024 (last updated April 10, 2024)
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.
Users are recommended to upgrade to version 2.4.59, which fixes this issue.
0
Attacker Value
Unknown
CVE-2023-38709
Disclosure Date: April 04, 2024 (last updated July 30, 2024)
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.
This issue affects Apache HTTP Server: through 2.4.58.
0
Attacker Value
Unknown
CVE-2024-1227
Disclosure Date: March 12, 2024 (last updated April 01, 2024)
An open redirect vulnerability, the exploitation of which could allow an attacker to create a custom URL and redirect a legitimate page to a malicious site.
0
Attacker Value
Unknown
CVE-2024-1226
Disclosure Date: March 12, 2024 (last updated April 01, 2024)
The software does not neutralize or incorrectly neutralizes certain characters before the data is included in outgoing HTTP headers. The inclusion of invalidated data in an HTTP header allows an attacker to specify the full HTTP response represented by the browser. An attacker could control the response and craft attacks such as cross-site scripting and cache poisoning attacks.
0
Attacker Value
Unknown
CVE-2021-4433
Disclosure Date: January 18, 2024 (last updated January 25, 2024)
A vulnerability was found in Karjasoft Sami HTTP Server 2.0. It has been classified as problematic. Affected is an unknown function of the component HTTP HEAD Rrequest Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250836.
0
Attacker Value
Unknown
CVE-2024-22087
Disclosure Date: January 05, 2024 (last updated January 12, 2024)
route in main.c in Pico HTTP Server in C through f3b69a6 has an sprintf stack-based buffer overflow via a long URI, leading to remote code execution.
0
Attacker Value
Unknown
CVE-2023-46918
Disclosure Date: December 27, 2023 (last updated January 06, 2024)
Phlox com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus has an Android manifest file that contains an entry with the android:allowBackup attribute set to true. This could be leveraged by an attacker with physical access to the device.
0
Attacker Value
Unknown
CVE-2023-46919
Disclosure Date: December 27, 2023 (last updated October 01, 2024)
Phlox com.phlox.simpleserver (aka Simple HTTP Server) 1.8 and com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus have a hardcoded aKySWb2jjrr4dzkYXczKRt7K (AES) encryption key. An attacker with physical access to the application's source code or binary can extract this key & use it decrypt the TLS secret.
0
Attacker Value
Unknown
CVE-2023-51771
Disclosure Date: December 25, 2023 (last updated January 04, 2024)
In MicroHttpServer (aka Micro HTTP Server) through a8ab029, _ParseHeader in lib/server.c allows a one-byte recv buffer overflow via a long URI.
0