Lucene search

K
EmbedthisGoahead

7 matches found

CVE
CVE
added 2017/03/13 6:59 a.m.305 views

CVE-2017-5674

A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration ...

9.8CVSS9.3AI score0.00808EPSS
CVE
CVE
added 2021/10/14 6:15 a.m.112 views

CVE-2021-42342

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

9.8CVSS9.3AI score0.77284EPSS
CVE
CVE
added 2019/12/03 10:15 p.m.111 views

CVE-2019-5096

An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request ...

9.8CVSS9.6AI score0.77407EPSS
CVE
CVE
added 2017/03/13 6:59 a.m.77 views

CVE-2017-5675

A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be ...

9CVSS8.6AI score0.00673EPSS
CVE
CVE
added 2022/08/08 7:15 p.m.54 views

CVE-2021-41615

websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1). NOTE: 2....

9.8CVSS9.4AI score0.0013EPSS
CVE
CVE
added 2022/01/25 8:15 p.m.54 views

CVE-2021-43298

The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until t...

9.8CVSS9.6AI score0.00287EPSS
CVE
CVE
added 2018/01/03 8:29 p.m.41 views

CVE-2017-1000471

EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service.

9.8CVSS9.3AI score0.00277EPSS