Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-31778 | CWE-476 NULL Pointer Dereference vulnerability in the evalExpr() function of GoAhead Web Server (version <= 6.0.0) when compiled with the ME_GOAHEAD_JAVASCRIPT flag. This vulnerability allows a remote attacker with the privileges to modify JavaScript template (JST) files to trigger a crash and cause a Denial of Service (DoS) by providing malicious templates. |
Solution
It is recommended to apply fixes introduced in version 6.0.1 of GoAhead and use the latest version available as base for building custom web servers.
Workaround
No workaround given by the vendor.
Thu, 17 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 17 Oct 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CWE-476 NULL Pointer Dereference vulnerability in the evalExpr() function of GoAhead Web Server (version <= 6.0.0) when compiled with the ME_GOAHEAD_JAVASCRIPT flag. This vulnerability allows a remote attacker with the privileges to modify JavaScript template (JST) files to trigger a crash and cause a Denial of Service (DoS) by providing malicious templates. | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2024-10-17T14:41:27.052Z
Reserved: 2024-04-02T13:02:29.658Z
Link: CVE-2024-3186
Updated: 2024-10-17T14:41:22.480Z
Status : Awaiting Analysis
Published: 2024-10-17T08:15:02.453
Modified: 2024-10-18T12:52:33.507
Link: CVE-2024-3186
No data.
OpenCVE Enrichment
Updated: 2025-07-12T16:01:36Z
EUVD