Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xm24-7446-mqm4

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.

Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.

EPSS

Процентиль: 91%
0.06854
Низкий

Связанные уязвимости

nvd
больше 21 года назад

Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.

debian
больше 21 года назад

Heap-based buffer overflow in the sec_filter_out function in mod_secur ...

EPSS

Процентиль: 91%
0.06854
Низкий