Show filters
871 Total Results
Displaying 71-80 of 871
Sort by:
Attacker Value
Unknown

CVE-2024-2653

Disclosure Date: April 03, 2024 (last updated April 10, 2024)
amphp/http will collect CONTINUATION frames in an unbounded buffer and will not check a limit until it has received the set END_HEADERS flag, resulting in an OOM crash.
0
Attacker Value
Unknown

CVE-2024-1227

Disclosure Date: March 12, 2024 (last updated April 01, 2024)
An open redirect vulnerability, the exploitation of which could allow an attacker to create a custom URL and redirect a legitimate page to a malicious site.
0
Attacker Value
Unknown

CVE-2024-1226

Disclosure Date: March 12, 2024 (last updated April 01, 2024)
The software does not neutralize or incorrectly neutralizes certain characters before the data is included in outgoing HTTP headers. The inclusion of invalidated data in an HTTP header allows an attacker to specify the full HTTP response represented by the browser. An attacker could control the response and craft attacks such as cross-site scripting and cache poisoning attacks.
0
Attacker Value
Unknown

CVE-2023-45289

Disclosure Date: March 05, 2024 (last updated March 06, 2024)
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.
0
Attacker Value
Unknown

CVE-2024-25712

Disclosure Date: February 29, 2024 (last updated January 17, 2025)
http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.
Attacker Value
Unknown

CVE-2023-45318

Disclosure Date: February 20, 2024 (last updated February 13, 2025)
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP git commit 80d4004. A specially crafted network packet can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
Attacker Value
Unknown

CVE-2024-23829

Disclosure Date: January 29, 2024 (last updated February 07, 2024)
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability.
Attacker Value
Unknown

CVE-2024-23644

Disclosure Date: January 24, 2024 (last updated February 03, 2024)
Trillium is a composable toolkit for building internet applications with async rust. In `trillium-http` prior to 0.3.12 and `trillium-client` prior to 0.5.4, insufficient validation of outbound header values may lead to request splitting or response splitting attacks in scenarios where attackers have sufficient control over headers. This only affects use cases where attackers have control of request headers, and can insert "\r\n" sequences. Specifically, if untrusted and unvalidated input is inserted into header names or values. Outbound `trillium_http::HeaderValue` and `trillium_http::HeaderName` can be constructed infallibly and were not checked for illegal bytes when sending requests from the client or responses from the server. Thus, if an attacker has sufficient control over header values (or names) in a request or response that they could inject `\r\n` sequences, they could get the client and server out of sync, and then pivot to gain control over other parts of requests or res…
Attacker Value
Unknown

CVE-2024-23771

Disclosure Date: January 22, 2024 (last updated January 27, 2024)
darkhttpd before 1.15 uses strcmp (which is not constant time) to verify authentication, which makes it easier for remote attackers to bypass authentication via a timing side channel.
Attacker Value
Unknown

CVE-2024-23770

Disclosure Date: January 22, 2024 (last updated January 27, 2024)
darkhttpd through 1.15 allows local users to discover credentials (for --auth) by listing processes and their arguments.