Логотип exploitDog
bind: "CVE-2024-43204"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-43204"

Количество 13

Количество 13

ubuntu логотип

CVE-2024-43204

6 месяцев назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-43204

6 месяцев назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2024-43204

6 месяцев назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2024-43204

6 месяцев назад

Apache HTTP Server: SSRF with mod_headers setting Content-Type header

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-43204

6 месяцев назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-q2wp-r77c-3cw8

6 месяцев назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-08957

больше 1 года назад

Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 5.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02685-1

5 месяцев назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02684-1

5 месяцев назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02683-1

5 месяцев назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02682-1

5 месяцев назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02565-1

6 месяцев назад

Security update for apache2

EPSS: Низкий
redos логотип

ROS-20250929-15

4 месяца назад

Множественные уязвимости httpd

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
redhat логотип
CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 5.4
0%
Низкий
6 месяцев назад
nvd логотип
CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
msrc логотип
CVE-2024-43204

Apache HTTP Server: SSRF with mod_headers setting Content-Type header

CVSS3: 7.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to ...

CVSS3: 7.5
0%
Низкий
6 месяцев назад
github логотип
GHSA-q2wp-r77c-3cw8

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-08957

Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 5.4
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2025:02685-1

Security update for apache2

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02684-1

Security update for apache2

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02683-1

Security update for apache2

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02682-1

Security update for apache2

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02565-1

Security update for apache2

6 месяцев назад
redos логотип
ROS-20250929-15

Множественные уязвимости httpd

CVSS3: 7.5
4 месяца назад

Уязвимостей на страницу