Количество 12
Количество 12
CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to for ...
GHSA-69h6-845f-grx4
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
BDU:2019-04308
Уязвимость модуля mod_session веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на целостность защищаемых данных
SUSE-SU-2018:0901-1
Security update for apache2
SUSE-SU-2018:0879-1
Security update for apache2
ELSA-2020-3958
ELSA-2020-3958: httpd security, bug fix, and enhancement update (MODERATE)
openSUSE-SU-2018:1198-1
Security update for apache2
SUSE-SU-2018:1161-2
Security update for apache2
SUSE-SU-2018:1161-1
Security update for apache2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-1283 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. | CVSS3: 5.3 | 3% Низкий | больше 7 лет назад | |
CVE-2018-1283 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. | CVSS3: 4.8 | 3% Низкий | больше 7 лет назад | |
CVE-2018-1283 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. | CVSS3: 5.3 | 3% Низкий | больше 7 лет назад | |
CVE-2018-1283 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to for ... | CVSS3: 5.3 | 3% Низкий | больше 7 лет назад | |
GHSA-69h6-845f-grx4 In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. | CVSS3: 5.3 | 3% Низкий | больше 3 лет назад | |
BDU:2019-04308 Уязвимость модуля mod_session веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на целостность защищаемых данных | CVSS3: 4.3 | 3% Низкий | больше 7 лет назад | |
SUSE-SU-2018:0901-1 Security update for apache2 | больше 7 лет назад | |||
SUSE-SU-2018:0879-1 Security update for apache2 | больше 7 лет назад | |||
ELSA-2020-3958 ELSA-2020-3958: httpd security, bug fix, and enhancement update (MODERATE) | около 5 лет назад | |||
openSUSE-SU-2018:1198-1 Security update for apache2 | больше 7 лет назад | |||
SUSE-SU-2018:1161-2 Security update for apache2 | около 7 лет назад | |||
SUSE-SU-2018:1161-1 Security update for apache2 | больше 7 лет назад |
Уязвимостей на страницу