Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ritlabs
Ritlabs tinyweb |
|
| CPEs | cpe:2.3:a:ritlabs:tinyweb:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ritlabs
Ritlabs tinyweb |
|
| Metrics |
cvssV3_1
|
Fri, 06 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Maximmasiutin
Maximmasiutin tinyweb |
|
| Vendors & Products |
Maximmasiutin
Maximmasiutin tinyweb |
Fri, 06 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.03, an integer overflow vulnerability in the string-to-integer conversion routine (_Val) allows an unauthenticated remote attacker to bypass Content-Length restrictions and perform HTTP Request Smuggling. This can lead to unauthorized access, security filter bypass, and potential cache poisoning. The impact is critical for servers using persistent connections (Keep-Alive). This issue has been patched in version 2.03. | |
| Title | TinyWeb: Integer Overflow in `_Val` (HTTP Request Smuggling) | |
| Weaknesses | CWE-190 CWE-444 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T16:10:28.611Z
Reserved: 2026-02-27T20:57:47.708Z
Link: CVE-2026-28497
Updated: 2026-03-06T16:00:30.671Z
Status : Analyzed
Published: 2026-03-06T04:16:07.990
Modified: 2026-03-16T15:37:17.303
Link: CVE-2026-28497
No data.
OpenCVE Enrichment
Updated: 2026-03-06T14:56:10Z