Show filters
871 Total Results
Displaying 91-100 of 871
Sort by:
Attacker Value
Unknown
CVE-2023-51771
Disclosure Date: December 25, 2023 (last updated January 04, 2024)
In MicroHttpServer (aka Micro HTTP Server) through a8ab029, _ParseHeader in lib/server.c allows a one-byte recv buffer overflow via a long URI.
0
Attacker Value
Unknown
CVE-2023-50639
Disclosure Date: December 20, 2023 (last updated December 22, 2023)
Cross Site Scripting (XSS) vulnerability in CuteHttpFileServer v.1.0 and v.2.0 allows attackers to obtain sensitive information via the file upload function in the home page.
0
Attacker Value
Unknown
CVE-2023-50965
Disclosure Date: December 17, 2023 (last updated December 21, 2023)
In MicroHttpServer (aka Micro HTTP Server) through 4398570, _ReadStaticFiles in lib/middleware.c allows a stack-based buffer overflow and potentially remote code execution via a long URI.
0
Attacker Value
Unknown
CVE-2023-49081
Disclosure Date: November 30, 2023 (last updated December 06, 2023)
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0.
0
Attacker Value
Unknown
CVE-2023-49082
Disclosure Date: November 29, 2023 (last updated December 05, 2023)
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation makes it possible for an attacker to modify the HTTP request (e.g. insert a new header) or even create a new HTTP request if the attacker controls the HTTP method. The vulnerability occurs only if the attacker can control the HTTP method (GET, POST etc.) of the request. If the attacker can control the HTTP version of the request it will be able to modify the request (request smuggling). This issue has been patched in version 3.9.0.
0
Attacker Value
Unknown
CVE-2023-48052
Disclosure Date: November 16, 2023 (last updated November 22, 2023)
Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdrop on communications between the host and server via a man-in-the-middle attack.
0
Attacker Value
Unknown
CVE-2023-47641
Disclosure Date: November 14, 2023 (last updated November 23, 2023)
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected versions of aiohttp have a security vulnerability regarding the inconsistent interpretation of the http protocol. HTTP/1.1 is a persistent protocol, if both Content-Length(CL) and Transfer-Encoding(TE) header values are present it can lead to incorrect interpretation of two entities that parse the HTTP and we can poison other sockets with this incorrect interpretation. A possible Proof-of-Concept (POC) would be a configuration with a reverse proxy(frontend) that accepts both CL and TE headers and aiohttp as backend. As aiohttp parses anything with chunked, we can pass a chunked123 as TE, the frontend entity will ignore this header and will parse Content-Length. The impact of this vulnerability is that it is possible to bypass any proxy rule, poisoning sockets to other users like passing Authentication Headers, also if it is present an Open Redirect an attacker could combine it to redirect random u…
0
Attacker Value
Unknown
CVE-2023-47627
Disclosure Date: November 14, 2023 (last updated November 23, 2023)
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP parser in AIOHTTP has numerous problems with header parsing, which could lead to request smuggling. This parser is only used when AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt wheel). These bugs have been addressed in commit `d5c12ba89` which has been included in release version 3.8.6. Users are advised to upgrade. There are no known workarounds for these issues.
0
Attacker Value
Unknown
CVE-2023-31247
Disclosure Date: November 14, 2023 (last updated November 18, 2023)
A memory corruption vulnerability exists in the HTTP Server Host header parsing functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2023-28391
Disclosure Date: November 14, 2023 (last updated November 18, 2023)
A memory corruption vulnerability exists in the HTTP Server header parsing functionality of Weston Embedded uC-HTTP v3.01.01. Specially crafted network packets can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.
0