Опубликовано: 30 окт. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8
Описание
Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 5.1.1-1 |
| cosmic | not-affected | 5.1.1-1 |
| devel | not-affected | 5.1.1-1 |
| disco | not-affected | 5.1.1-1 |
| esm-apps/bionic | not-affected | 5.1.1-1 |
| esm-apps/xenial | not-affected | 5.1.1-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| lucid | DNE | |
| precise | ignored | end of life |
Показывать по
10
EPSS
Процентиль: 60%
0.00387
Низкий
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
CVSS3: 9.8
nvd
больше 8 лет назад
Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT.
CVSS3: 9.8
debian
больше 8 лет назад
Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to by ...
CVSS3: 9.8
github
почти 4 года назад
Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT.
EPSS
Процентиль: 60%
0.00387
Низкий
7.5 High
CVSS2
9.8 Critical
CVSS3