Количество 12
Количество 12

CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.

CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.

CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to for ...
GHSA-69h6-845f-grx4
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.

BDU:2019-04308
Уязвимость модуля mod_session веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на целостность защищаемых данных

SUSE-SU-2018:0901-1
Security update for apache2

SUSE-SU-2018:0879-1
Security update for apache2
ELSA-2020-3958
ELSA-2020-3958: httpd security, bug fix, and enhancement update (MODERATE)

openSUSE-SU-2018:1198-1
Security update for apache2

SUSE-SU-2018:1161-2
Security update for apache2

SUSE-SU-2018:1161-1
Security update for apache2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2018-1283 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. | CVSS3: 5.3 | 6% Низкий | около 7 лет назад |
![]() | CVE-2018-1283 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. | CVSS3: 4.8 | 6% Низкий | около 7 лет назад |
![]() | CVE-2018-1283 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. | CVSS3: 5.3 | 6% Низкий | около 7 лет назад |
CVE-2018-1283 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to for ... | CVSS3: 5.3 | 6% Низкий | около 7 лет назад | |
GHSA-69h6-845f-grx4 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. | CVSS3: 5.3 | 6% Низкий | около 3 лет назад | |
![]() | BDU:2019-04308 Уязвимость модуля mod_session веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на целостность защищаемых данных | CVSS3: 4.3 | 6% Низкий | около 7 лет назад |
![]() | SUSE-SU-2018:0901-1 Security update for apache2 | около 7 лет назад | ||
![]() | SUSE-SU-2018:0879-1 Security update for apache2 | около 7 лет назад | ||
ELSA-2020-3958 ELSA-2020-3958: httpd security, bug fix, and enhancement update (MODERATE) | больше 4 лет назад | |||
![]() | openSUSE-SU-2018:1198-1 Security update for apache2 | около 7 лет назад | ||
![]() | SUSE-SU-2018:1161-2 Security update for apache2 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:1161-1 Security update for apache2 | около 7 лет назад |
Уязвимостей на страницу