CVE-2023-53155
- EPSS 0.06%
- Published 25.07.2025 17:15:29
- Last modified 29.07.2025 14:14:55
goform/formTest in EmbedThis GoAhead 2.5 allows HTML injection via the name parameter.
CVE-2024-3187
- EPSS 0.62%
- Published 17.10.2024 08:15:02
- Last modified 18.10.2024 12:52:33
This issue tracks two CWE-416 Use After Free (UAF) and one CWE-415 Double Free vulnerabilities in Goahead versions <= 6.0.0. These are caused by JST values not being nulled when freed during parsing of JST templates. If the ME_GOAHEAD_JAVASCRIPT flag...
CVE-2024-3186
- EPSS 0.17%
- Published 17.10.2024 08:15:02
- Last modified 18.10.2024 12:52:33
CWE-476 NULL Pointer Dereference vulnerability in the evalExpr() function of GoAhead Web Server (version <= 6.0.0) when compiled with the ME_GOAHEAD_JAVASCRIPT flag. This vulnerability allows a remote attacker with the privileges to modify JavaScript...
CVE-2024-3184
- EPSS 0.19%
- Published 17.10.2024 08:15:01
- Last modified 18.10.2024 12:52:33
Multiple CWE-476 NULL Pointer Dereference vulnerabilities were found in GoAhead Web Server up to version 6.0.0 when compiled with the ME_GOAHEAD_REPLACE_MALLOC flag. Without a memory notifier for allocation failures, remote attackers can exploit thes...
CVE-2021-41615
- EPSS 0.28%
- Published 08.08.2022 19:15:12
- Last modified 21.11.2024 06:26:31
websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 ...
CVE-2021-43298
- EPSS 0.29%
- Published 25.01.2022 20:15:08
- Last modified 21.11.2024 06:29:01
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, b...
CVE-2021-42342
- EPSS 77.28%
- Published 14.10.2021 06:15:07
- Last modified 21.11.2024 06:27:38
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerabl...
CVE-2020-15688
- EPSS 0.27%
- Published 23.07.2020 13:15:10
- Last modified 21.11.2024 05:06:01
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the und...
CVE-2019-5097
- EPSS 1.14%
- Published 03.12.2019 22:15:14
- Last modified 21.11.2024 04:44:20
A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the proces...
CVE-2019-5096
- EPSS 77.41%
- Published 03.12.2019 22:15:14
- Last modified 21.11.2024 04:44:20
An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free...