CVE-2022-35252
- EPSS 0.08%
- Veröffentlicht 23.09.2022 14:15:12
- Zuletzt bearbeitet 05.05.2025 17:18:16
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service...
CVE-2022-32205
- EPSS 1.4%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 05.05.2025 17:18:12
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...
CVE-2022-32206
- EPSS 2.57%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 05.05.2025 17:18:13
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...
CVE-2022-32207
- EPSS 0.17%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 23.04.2025 18:15:53
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...
CVE-2022-32208
- EPSS 0.3%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 05.05.2025 17:18:13
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
CVE-2022-26377
- EPSS 32.2%
- Veröffentlicht 09.06.2022 17:15:09
- Zuletzt bearbeitet 01.05.2025 15:35:56
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apach...
CVE-2022-28614
- EPSS 0.29%
- Veröffentlicht 09.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 06:57:35
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled an...
CVE-2022-28615
- EPSS 0.73%
- Veröffentlicht 09.06.2022 17:15:09
- Zuletzt bearbeitet 01.05.2025 15:35:44
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, th...
CVE-2022-29404
- EPSS 1.54%
- Veröffentlicht 09.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 06:59:01
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
CVE-2022-30522
- EPSS 20.63%
- Veröffentlicht 09.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 07:02:52
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.