Описание
Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.
Ссылки
- PatchVendor Advisory
- ExploitPatch
- Patch
- Patch
- PatchVendor Advisory
- ExploitPatch
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:mod_security:mod_security:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mod_security:mod_security:1.7.1:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06854
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
больше 21 года назад
Heap-based buffer overflow in the sec_filter_out function in mod_secur ...
github
больше 3 лет назад
Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.
EPSS
Процентиль: 91%
0.06854
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other