Логотип exploitDog
bind:CVE-2017-15715
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-15715

Количество 12

Количество 12

ubuntu логотип

CVE-2017-15715

почти 8 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 8.1
EPSS: Критический
redhat логотип

CVE-2017-15715

почти 8 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 3.7
EPSS: Критический
nvd логотип

CVE-2017-15715

почти 8 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 8.1
EPSS: Критический
debian логотип

CVE-2017-15715

почти 8 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMat ...

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-p3h3-wpw6-m7vf

больше 3 лет назад

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 8.1
EPSS: Критический
fstec логотип

BDU:2019-04106

почти 8 лет назад

Уязвимость компонента <FilesMatch> веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.3
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2018:0901-1

почти 8 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0879-1

почти 8 лет назад

Security update for apache2

EPSS: Низкий
oracle-oval логотип

ELSA-2020-3958

больше 5 лет назад

ELSA-2020-3958: httpd security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:1198-1

больше 7 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1161-2

больше 7 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1161-1

больше 7 лет назад

Security update for apache2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-15715

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 8.1
94%
Критический
почти 8 лет назад
redhat логотип
CVE-2017-15715

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 3.7
94%
Критический
почти 8 лет назад
nvd логотип
CVE-2017-15715

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 8.1
94%
Критический
почти 8 лет назад
debian логотип
CVE-2017-15715

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMat ...

CVSS3: 8.1
94%
Критический
почти 8 лет назад
github логотип
GHSA-p3h3-wpw6-m7vf

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.

CVSS3: 8.1
94%
Критический
больше 3 лет назад
fstec логотип
BDU:2019-04106

Уязвимость компонента <FilesMatch> веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.3
94%
Критический
почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0901-1

Security update for apache2

почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0879-1

Security update for apache2

почти 8 лет назад
oracle-oval логотип
ELSA-2020-3958

ELSA-2020-3958: httpd security, bug fix, and enhancement update (MODERATE)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2018:1198-1

Security update for apache2

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1161-2

Security update for apache2

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1161-1

Security update for apache2

больше 7 лет назад

Уязвимостей на страницу