Lucene search

K

10 matches found

CVE
CVE
added 2017/12/12 7:29 p.m.988 views

CVE-2017-17562

Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dyn...

8.1CVSS8.2AI score0.94053EPSS
CVE
CVE
added 2021/10/14 6:15 a.m.112 views

CVE-2021-42342

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

9.8CVSS9.3AI score0.77284EPSS
CVE
CVE
added 2019/12/03 10:15 p.m.111 views

CVE-2019-5096

An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request ...

9.8CVSS9.6AI score0.77407EPSS
CVE
CVE
added 2019/11/22 7:15 p.m.104 views

CVE-2019-19240

Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitializ...

5.3CVSS5.3AI score0.00533EPSS
CVE
CVE
added 2020/07/23 1:15 p.m.92 views

CVE-2020-15688

The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.

8.8CVSS8.8AI score0.00269EPSS
CVE
CVE
added 2019/12/03 10:15 p.m.80 views

CVE-2019-5097

A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form...

7.5CVSS7.5AI score0.01141EPSS
CVE
CVE
added 2019/06/14 2:29 p.m.70 views

CVE-2019-12822

In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself.

7.5CVSS7.5AI score0.00703EPSS
CVE
CVE
added 2022/01/25 8:15 p.m.54 views

CVE-2021-43298

The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until t...

9.8CVSS9.6AI score0.00287EPSS
CVE
CVE
added 2018/08/18 3:29 a.m.46 views

CVE-2018-15504

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.

7.5CVSS7.5AI score0.00416EPSS
CVE
CVE
added 2018/08/18 3:29 a.m.46 views

CVE-2018-15505

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address.

7.5CVSS7.5AI score0.00147EPSS