Логотип exploitDog
bind:"CVE-2009-3095" OR bind:"CVE-2009-3555" OR bind:"CVE-2009-3094"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2009-3095" OR bind:"CVE-2009-3555" OR bind:"CVE-2009-3094"

Количество 54

Количество 54

oracle-oval логотип

ELSA-2009-1579

больше 15 лет назад

ELSA-2009-1579: httpd security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2009-3095

почти 16 лет назад

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2009-3095

почти 16 лет назад

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2009-3095

почти 16 лет назад

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2009-3095

почти 16 лет назад

The mod_proxy_ftp module in the Apache HTTP Server allows remote attac ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-w532-9px6-hv54

около 3 лет назад

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

EPSS: Низкий
ubuntu логотип

CVE-2009-3094

почти 16 лет назад

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

CVSS2: 2.6
EPSS: Низкий
redhat логотип

CVE-2009-3094

почти 16 лет назад

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2009-3094

почти 16 лет назад

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

CVSS2: 2.6
EPSS: Низкий
debian логотип

CVE-2009-3094

почти 16 лет назад

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the ...

CVSS2: 2.6
EPSS: Низкий
ubuntu логотип

CVE-2009-3555

больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 5.8
EPSS: Низкий
redhat логотип

CVE-2009-3555

больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2009-3555

больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 5.8
EPSS: Низкий
debian логотип

CVE-2009-3555

больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as us ...

CVSS2: 5.8
EPSS: Низкий
github логотип

GHSA-vg4c-4xc2-v43h

около 3 лет назад

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

EPSS: Низкий
github логотип

GHSA-f7w7-6pjc-wwm6

около 3 лет назад

Apache Tomcat affected by vulnerability in TLS and SSL protocol

EPSS: Низкий
oracle-oval логотип

ELSA-2010-0165

около 15 лет назад

ELSA-2010-0165: nss security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2010-0164

около 15 лет назад

ELSA-2010-0164: openssl097a security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-08549

около 15 лет назад

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий
fstec логотип

BDU:2015-07481

около 15 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2009-1579

ELSA-2009-1579: httpd security update (MODERATE)

больше 15 лет назад
ubuntu логотип
CVE-2009-3095

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

CVSS2: 5
4%
Низкий
почти 16 лет назад
redhat логотип
CVE-2009-3095

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

CVSS2: 2.6
4%
Низкий
почти 16 лет назад
nvd логотип
CVE-2009-3095

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

CVSS2: 5
4%
Низкий
почти 16 лет назад
debian логотип
CVE-2009-3095

The mod_proxy_ftp module in the Apache HTTP Server allows remote attac ...

CVSS2: 5
4%
Низкий
почти 16 лет назад
github логотип
GHSA-w532-9px6-hv54

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

4%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2009-3094

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

CVSS2: 2.6
3%
Низкий
почти 16 лет назад
redhat логотип
CVE-2009-3094

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

CVSS2: 2.6
3%
Низкий
почти 16 лет назад
nvd логотип
CVE-2009-3094

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

CVSS2: 2.6
3%
Низкий
почти 16 лет назад
debian логотип
CVE-2009-3094

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the ...

CVSS2: 2.6
3%
Низкий
почти 16 лет назад
ubuntu логотип
CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 5.8
4%
Низкий
больше 15 лет назад
redhat логотип
CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 4.3
4%
Низкий
больше 15 лет назад
nvd логотип
CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

CVSS2: 5.8
4%
Низкий
больше 15 лет назад
debian логотип
CVE-2009-3555

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as us ...

CVSS2: 5.8
4%
Низкий
больше 15 лет назад
github логотип
GHSA-vg4c-4xc2-v43h

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.

3%
Низкий
около 3 лет назад
github логотип
GHSA-f7w7-6pjc-wwm6

Apache Tomcat affected by vulnerability in TLS and SSL protocol

4%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2010-0165

ELSA-2010-0165: nss security update (MODERATE)

около 15 лет назад
oracle-oval логотип
ELSA-2010-0164

ELSA-2010-0164: openssl097a security update (MODERATE)

около 15 лет назад
fstec логотип
BDU:2015-08549

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
4%
Низкий
около 15 лет назад
fstec логотип
BDU:2015-07481

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 7.5
4%
Низкий
около 15 лет назад

Уязвимостей на страницу