Количество 20
Количество 20
ELSA-2017-2972
ELSA-2017-2972: httpd security update (MODERATE)
CVE-2017-12171
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
CVE-2017-12171
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
CVE-2017-12171
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
CVE-2017-12171
A regression was found in the Red Hat Enterprise Linux 6.9 version of ...
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process ...
GHSA-c8w6-x7h9-gq97
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
BDU:2019-00234
Уязвимость HTTP-сервера Apache, связанная с использованием памяти после ее освобождения, позволяющая нарушителю раскрыть части памяти сервера, вызвать сбой дочернего процесса httpd или получить доступ к закрытым HTTP-ресурсам
openSUSE-SU-2017:2549-1
Security update for apache2
SUSE-SU-2017:2718-1
Security update for apache2
SUSE-SU-2017:2542-1
Security update for apache2
GHSA-jxf6-fx3m-8x2r
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
ELSA-2017-2882
ELSA-2017-2882: httpd security update (MODERATE)
BDU:2018-00103
Уязвимость функции ap_limit_section httpd-демона веб-сервера Apache HTTP Server, позволяющая нарушителю получить доступ к данным из памяти процесса
SUSE-SU-2017:2756-1
Security update for apache2
SUSE-SU-2017:2907-1
Security update for apache2
openSUSE-SU-2018:1057-1
Security update for virtualbox
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2017-2972 ELSA-2017-2972: httpd security update (MODERATE) | около 8 лет назад | |||
CVE-2017-12171 A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource. | CVSS3: 6.5 | 1% Низкий | больше 7 лет назад | |
CVE-2017-12171 A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource. | CVSS3: 6.5 | 1% Низкий | около 8 лет назад | |
CVE-2017-12171 A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource. | CVSS3: 6.5 | 1% Низкий | больше 7 лет назад | |
CVE-2017-12171 A regression was found in the Red Hat Enterprise Linux 6.9 version of ... | CVSS3: 6.5 | 1% Низкий | больше 7 лет назад | |
CVE-2017-9798 Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. | CVSS3: 7.5 | 94% Критический | около 8 лет назад | |
CVE-2017-9798 Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. | CVSS3: 5.9 | 94% Критический | около 8 лет назад | |
CVE-2017-9798 Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. | CVSS3: 7.5 | 94% Критический | около 8 лет назад | |
CVE-2017-9798 Apache httpd allows remote attackers to read secret data from process ... | CVSS3: 7.5 | 94% Критический | около 8 лет назад | |
GHSA-c8w6-x7h9-gq97 A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource. | CVSS3: 6.5 | 1% Низкий | больше 3 лет назад | |
BDU:2019-00234 Уязвимость HTTP-сервера Apache, связанная с использованием памяти после ее освобождения, позволяющая нарушителю раскрыть части памяти сервера, вызвать сбой дочернего процесса httpd или получить доступ к закрытым HTTP-ресурсам | CVSS3: 6.5 | 1% Низкий | около 8 лет назад | |
openSUSE-SU-2017:2549-1 Security update for apache2 | 94% Критический | около 8 лет назад | ||
SUSE-SU-2017:2718-1 Security update for apache2 | 94% Критический | около 8 лет назад | ||
SUSE-SU-2017:2542-1 Security update for apache2 | 94% Критический | около 8 лет назад | ||
GHSA-jxf6-fx3m-8x2r Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. | CVSS3: 7.5 | 94% Критический | больше 3 лет назад | |
ELSA-2017-2882 ELSA-2017-2882: httpd security update (MODERATE) | около 8 лет назад | |||
BDU:2018-00103 Уязвимость функции ap_limit_section httpd-демона веб-сервера Apache HTTP Server, позволяющая нарушителю получить доступ к данным из памяти процесса | CVSS3: 5.3 | 94% Критический | около 8 лет назад | |
SUSE-SU-2017:2756-1 Security update for apache2 | около 8 лет назад | |||
SUSE-SU-2017:2907-1 Security update for apache2 | около 8 лет назад | |||
openSUSE-SU-2018:1057-1 Security update for virtualbox | больше 7 лет назад |
Уязвимостей на страницу