Логотип exploitDog
bind:"CVE-2015-0228" OR bind:"CVE-2015-3185" OR bind:"CVE-2015-0253" OR bind:"CVE-2015-3183"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2015-0228" OR bind:"CVE-2015-3185" OR bind:"CVE-2015-0253" OR bind:"CVE-2015-3183"

Количество 31

Количество 31

oracle-oval логотип

ELSA-2015-1666

больше 9 лет назад

ELSA-2015-1666: httpd24-httpd security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2015-0228

больше 10 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

CVSS2: 5
EPSS: Средний
redhat логотип

CVE-2015-0228

больше 10 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

CVSS2: 5
EPSS: Средний
nvd логотип

CVE-2015-0228

больше 10 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

CVSS2: 5
EPSS: Средний
debian логотип

CVE-2015-0228

больше 10 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module ...

CVSS2: 5
EPSS: Средний
oracle-oval логотип

ELSA-2015-1667

около 10 лет назад

ELSA-2015-1667: httpd security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-73qw-6rjv-mchr

больше 3 лет назад

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

EPSS: Средний
fstec логотип

BDU:2015-10926

больше 10 лет назад

Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании

CVSS2: 5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2015:1851-1

почти 10 лет назад

Security update for apache2

EPSS: Низкий
ubuntu логотип

CVE-2015-3185

около 10 лет назад

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2015-3185

около 10 лет назад

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2015-3185

около 10 лет назад

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2015-3185

около 10 лет назад

The ap_some_auth_required function in server/request.c in the Apache H ...

CVSS2: 4.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0974-1

больше 10 лет назад

Security update for apache2

EPSS: Низкий
github логотип

GHSA-5fv4-m5x3-j32p

больше 3 лет назад

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

EPSS: Низкий
fstec логотип

BDU:2015-10929

около 10 лет назад

Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю обойти существующие ограничения доступа

CVSS2: 4.3
EPSS: Низкий
ubuntu логотип

CVE-2015-0253

около 10 лет назад

The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2015-0253

около 10 лет назад

The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2015-0253

около 10 лет назад

The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2015-0253

около 10 лет назад

The read_request_line function in server/protocol.c in the Apache HTTP ...

CVSS2: 5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2015-1666

ELSA-2015-1666: httpd24-httpd security update (MODERATE)

больше 9 лет назад
ubuntu логотип
CVE-2015-0228

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

CVSS2: 5
11%
Средний
больше 10 лет назад
redhat логотип
CVE-2015-0228

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

CVSS2: 5
11%
Средний
больше 10 лет назад
nvd логотип
CVE-2015-0228

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

CVSS2: 5
11%
Средний
больше 10 лет назад
debian логотип
CVE-2015-0228

The lua_websocket_read function in lua_request.c in the mod_lua module ...

CVSS2: 5
11%
Средний
больше 10 лет назад
oracle-oval логотип
ELSA-2015-1667

ELSA-2015-1667: httpd security update (MODERATE)

около 10 лет назад
github логотип
GHSA-73qw-6rjv-mchr

The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.

11%
Средний
больше 3 лет назад
fstec логотип
BDU:2015-10926

Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании

CVSS2: 5
11%
Средний
больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1851-1

Security update for apache2

почти 10 лет назад
ubuntu логотип
CVE-2015-3185

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVSS2: 4.3
7%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-3185

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVSS3: 3.7
7%
Низкий
около 10 лет назад
nvd логотип
CVE-2015-3185

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVSS2: 4.3
7%
Низкий
около 10 лет назад
debian логотип
CVE-2015-3185

The ap_some_auth_required function in server/request.c in the Apache H ...

CVSS2: 4.3
7%
Низкий
около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0974-1

Security update for apache2

больше 10 лет назад
github логотип
GHSA-5fv4-m5x3-j32p

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

7%
Низкий
больше 3 лет назад
fstec логотип
BDU:2015-10929

Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю обойти существующие ограничения доступа

CVSS2: 4.3
7%
Низкий
около 10 лет назад
ubuntu логотип
CVE-2015-0253

The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.

CVSS2: 5
7%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-0253

The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.

CVSS2: 2.6
7%
Низкий
около 10 лет назад
nvd логотип
CVE-2015-0253

The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.

CVSS2: 5
7%
Низкий
около 10 лет назад
debian логотип
CVE-2015-0253

The read_request_line function in server/protocol.c in the Apache HTTP ...

CVSS2: 5
7%
Низкий
около 10 лет назад

Уязвимостей на страницу