Vulnerabilities (CVE)

Filtered by vendor Oisf Subscribe
Filtered by product Libhtp
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-45797 1 Oisf 1 Libhtp 2025-07-09 N/A 7.5 HIGH
LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Prior to version 0.5.49, unbounded processing of HTTP request and response headers can lead to excessive CPU time and memory utilization, possibly leading to extreme slowdowns. This issue is addressed in 0.5.49.
CVE-2024-28871 1 Oisf 1 Libhtp 2025-06-30 N/A 7.5 HIGH
LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5.46 may parse malformed request traffic, leading to excessive CPU usage. Version 0.5.47 contains a patch for the issue. No known workarounds are available.
CVE-2015-0928 1 Oisf 1 Libhtp 2025-04-20 5.0 MEDIUM 7.5 HIGH
libhtp 0.5.15 allows remote attackers to cause a denial of service (NULL pointer dereference).
CVE-2024-23837 2 Fedoraproject, Oisf 2 Fedora, Libhtp 2025-02-07 N/A 7.5 HIGH
LibHTP is a security-aware parser for the HTTP protocol. Crafted traffic can cause excessive processing time of HTTP headers, leading to denial of service. This issue is addressed in 0.5.46.
CVE-2019-17420 2 Oisf, Suricata-ids 2 Libhtp, Suricata 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.
CVE-2018-10243 1 Oisf 1 Libhtp 2024-11-21 7.5 HIGH 9.8 CRITICAL
htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header.