Количество 16
Количество 16

BDU:2022-04146
Уязвимость функции ap_strcmp_match() веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации

CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose informatio ...
GHSA-4hj9-gjv4-4363
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.

SUSE-SU-2022:2342-1
Security update for apache2

SUSE-SU-2022:2338-1
Security update for apache2

SUSE-SU-2022:2302-1
Security update for apache2

SUSE-SU-2022:2101-1
Security update for apache2

SUSE-SU-2022:2099-1
Security update for apache2

ROS-20220628-01
Множественные уязвимости Apache HTTP

RLSA-2022:8067
Moderate: httpd security, bug fix, and enhancement update

RLSA-2022:7647
Moderate: httpd:2.4 security update
ELSA-2022-8067
ELSA-2022-8067: httpd security, bug fix, and enhancement update (MODERATE)
ELSA-2022-7647
ELSA-2022-7647: httpd:2.4 security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-04146 Уязвимость функции ap_strcmp_match() веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации | CVSS3: 4 | 1% Низкий | около 3 лет назад |
![]() | CVE-2022-28615 Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. | CVSS3: 9.1 | 1% Низкий | около 3 лет назад |
![]() | CVE-2022-28615 Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. | CVSS3: 7.4 | 1% Низкий | около 3 лет назад |
![]() | CVE-2022-28615 Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. | CVSS3: 9.1 | 1% Низкий | около 3 лет назад |
CVE-2022-28615 Apache HTTP Server 2.4.53 and earlier may crash or disclose informatio ... | CVSS3: 9.1 | 1% Низкий | около 3 лет назад | |
GHSA-4hj9-gjv4-4363 Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected. | CVSS3: 9.1 | 1% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:2342-1 Security update for apache2 | почти 3 года назад | ||
![]() | SUSE-SU-2022:2338-1 Security update for apache2 | почти 3 года назад | ||
![]() | SUSE-SU-2022:2302-1 Security update for apache2 | почти 3 года назад | ||
![]() | SUSE-SU-2022:2101-1 Security update for apache2 | около 3 лет назад | ||
![]() | SUSE-SU-2022:2099-1 Security update for apache2 | около 3 лет назад | ||
![]() | ROS-20220628-01 Множественные уязвимости Apache HTTP | почти 3 года назад | ||
![]() | RLSA-2022:8067 Moderate: httpd security, bug fix, and enhancement update | больше 2 лет назад | ||
![]() | RLSA-2022:7647 Moderate: httpd:2.4 security update | больше 2 лет назад | ||
ELSA-2022-8067 ELSA-2022-8067: httpd security, bug fix, and enhancement update (MODERATE) | больше 2 лет назад | |||
ELSA-2022-7647 ELSA-2022-7647: httpd:2.4 security update (MODERATE) | больше 2 лет назад |
Уязвимостей на страницу