Lucene search

K

6 matches found

CVE
CVE
added 2022/08/04 7:15 p.m.55 views

CVE-2022-34970

Crow before 1.0+4 has a heap-based buffer overflow via the function qs_parse in query_string.h. On successful exploitation this vulnerability allows attackers to remotely execute arbitrary code in the context of the vulnerable service.

9.8CVSS9.7AI score0.0495EPSS
CVE
CVE
added 2023/09/12 5:15 a.m.55 views

CVE-2023-26142

All versions of the package crow are vulnerable to HTTP Response Splitting when untrusted user input is used to build header values. Header values are not properly sanitized against CRLF Injection in the set_header and add_header functions. An attacker can add the \r\n (carriage return line feeds) ...

6.5CVSS6.4AI score0.00167EPSS
CVE
CVE
added 2022/08/22 8:15 p.m.54 views

CVE-2022-38667

HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used. The HTTP parser supports HTTP pipelining, but the asynchronous Connection layer is unaware of HTTP pipelining. Specifically, the Connection layer is unaware that it ha...

9.8CVSS9.6AI score0.01604EPSS
CVE
CVE
added 2022/01/13 3:15 p.m.45 views

CVE-2021-23824

This affects the package Crow before 0.3+4. When using attributes without quotes in the template, an attacker can manipulate the input to introduce additional attributes, potentially executing code. This may lead to a Cross-site Scripting (XSS) vulnerability, assuming an attacker can influence the ...

6.5CVSS6AI score0.00291EPSS
CVE
CVE
added 2022/01/13 2:15 p.m.33 views

CVE-2021-23514

This affects the package Crow before 0.3+4. It is possible to traverse directories to fetch arbitrary files from the server.

7.5CVSS7AI score0.00483EPSS
CVE
CVE
added 2022/08/22 8:15 p.m.30 views

CVE-2022-38668

HTTP applications (servers) based on Crow through 1.0+4 may reveal potentially sensitive uninitialized data from stack memory when fulfilling a request for a static file smaller than 16 KB.

7.5CVSS7.5AI score0.00118EPSS