CVE-2022-0329
Apache Web Server HTTP Header Injection
Description
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage
INFO
Published Date :
Jan. 21, 2022, 11:15 a.m.
Last Modified :
Nov. 7, 2023, 3:41 a.m.
Remotely Exploit :
No
Source :
[email protected]
Public PoC/Exploit Available at Github
CVE-2022-0329 has a 2 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Got a bogus CVE someone got for a non-vuln? Please share here!
The most pythonic ORM (for SQLite and PostgreSQL). Seriously, try it out!
sqlite3 sqlite sql python3 db awesome database databases python orm sqlite3-orm postgresql-orm pythonic
Python
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-0329 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-0329 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by [email protected]
Nov. 07, 2023
Action Type Old Value New Value Changed Description ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage. Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage -
CVE Modified by [email protected]
Feb. 02, 2022
Action Type Old Value New Value Changed Description Code Injection in PyPi loguru prior to and including 0.5.3. ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage. Removed CVSS V3 huntr.dev AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L Removed Reference https://github.com/Delgan/loguru/issues/563 [No Types Assigned] Removed Reference https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b [Patch, Third Party Advisory] Removed Reference https://huntr.dev/bounties/1-pypi-loguru [Exploit, Patch, Third Party Advisory] Removed Reference https://tomforb.es/cve-2022-0329-and-the-problems-with-automated-vulnerability-management/ [No Types Assigned] Removed CWE huntr.dev CWE-94 -
CVE Rejected by [email protected]
Feb. 02, 2022
Action Type Old Value New Value -
CVE Modified by [email protected]
Jan. 29, 2022
Action Type Old Value New Value Added Reference https://tomforb.es/cve-2022-0329-and-the-problems-with-automated-vulnerability-management/ [No Types Assigned] Added Reference https://github.com/Delgan/loguru/issues/563 [No Types Assigned] -
Initial Analysis by [email protected]
Jan. 27, 2022
Action Type Old Value New Value Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P) Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Changed Reference Type https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b No Types Assigned https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b Patch, Third Party Advisory Changed Reference Type https://huntr.dev/bounties/1-pypi-loguru No Types Assigned https://huntr.dev/bounties/1-pypi-loguru Exploit, Patch, Third Party Advisory Added CPE Configuration OR *cpe:2.3:a:loguru_project:loguru:*:*:*:*:*:python:*:* versions up to (including) 0.5.3 -
CVE Modified by [email protected]
Jan. 21, 2022
Action Type Old Value New Value Changed Description Code Injection in Conda loguru prior to master. Code Injection in PyPi loguru prior to and including 0.5.3.