CVE-2024-49769
- EPSS 0.37%
- Veröffentlicht 29.10.2024 15:15:12
- Zuletzt bearbeitet 21.11.2024 09:41:49
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread...
CVE-2024-49768
- EPSS 0.04%
- Veröffentlicht 29.10.2024 15:15:11
- Zuletzt bearbeitet 07.11.2024 17:28:02
Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may send a request that is exactly recv_bytes (defaults to 8192) long, followed by a secondary request using HTTP pipelining. When request lookahead is disabled (de...
CVE-2022-31015
- EPSS 0.44%
- Veröffentlicht 31.05.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 07:03:43
Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an...
CVE-2022-24761
- EPSS 0.2%
- Veröffentlicht 17.03.2022 13:15:07
- Zuletzt bearbeitet 21.11.2024 06:51:02
Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy ...
CVE-2020-5236
- EPSS 15.5%
- Veröffentlicht 04.02.2020 03:15:10
- Zuletzt bearbeitet 21.11.2024 05:33:44
Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains invalid characters. When a header like "Bad-header: xxxxxxxxxxxxxxx\x10" is received, it will cause the regular expression engine to catastrophically backtrack c...
CVE-2019-16792
- EPSS 0.85%
- Veröffentlicht 22.01.2020 19:15:11
- Zuletzt bearbeitet 21.11.2024 04:31:11
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Co...
CVE-2019-16789
- EPSS 0.6%
- Veröffentlicht 26.12.2019 17:15:13
- Zuletzt bearbeitet 21.11.2024 04:31:11
In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Spec...
CVE-2019-16785
- EPSS 0.43%
- Veröffentlicht 20.12.2019 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:31:11
Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any pr...
CVE-2019-16786
- EPSS 0.52%
- Veröffentlicht 20.12.2019 23:15:11
- Zuletzt bearbeitet 21.11.2024 04:31:11
Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-En...