Логотип exploitDog
bind:"BDU:2022-00270" OR bind:"CVE-2019-17567"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-00270" OR bind:"CVE-2019-17567"

Количество 7

Количество 7

fstec логотип

BDU:2022-00270

больше 4 лет назад

Уязвимость свободного веб-сервера apache2, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 5.3
EPSS: Средний
ubuntu логотип

CVE-2019-17567

больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
EPSS: Средний
redhat логотип

CVE-2019-17567

больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 4.8
EPSS: Средний
nvd логотип

CVE-2019-17567

больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
EPSS: Средний
msrc логотип

CVE-2019-17567

около 4 лет назад

CVSS3: 5.3
EPSS: Средний
debian логотип

CVE-2019-17567

больше 4 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configu ...

CVSS3: 5.3
EPSS: Средний
github логотип

GHSA-qf63-wqjv-7x2f

больше 3 лет назад

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-00270

Уязвимость свободного веб-сервера apache2, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 5.3
10%
Средний
больше 4 лет назад
ubuntu логотип
CVE-2019-17567

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
10%
Средний
больше 4 лет назад
redhat логотип
CVE-2019-17567

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 4.8
10%
Средний
больше 4 лет назад
nvd логотип
CVE-2019-17567

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
10%
Средний
больше 4 лет назад
msrc логотип
CVSS3: 5.3
10%
Средний
около 4 лет назад
debian логотип
CVE-2019-17567

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configu ...

CVSS3: 5.3
10%
Средний
больше 4 лет назад
github логотип
GHSA-qf63-wqjv-7x2f

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS3: 5.3
10%
Средний
больше 3 лет назад

Уязвимостей на страницу