Логотип exploitDog
bind:"CVE-2018-1301" OR bind:"CVE-2017-15710" OR bind:"CVE-2018-17199"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-1301" OR bind:"CVE-2017-15710" OR bind:"CVE-2018-17199"

Количество 34

Количество 34

oracle-oval логотип

ELSA-2020-1121

около 5 лет назад

ELSA-2020-1121: httpd security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1079-1

около 7 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0901-1

около 7 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0879-1

около 7 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:1198-1

около 7 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1161-2

больше 6 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1161-1

около 7 лет назад

Security update for apache2

EPSS: Низкий
ubuntu логотип

CVE-2018-1301

около 7 лет назад

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-1301

около 7 лет назад

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2018-1301

около 7 лет назад

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-1301

около 7 лет назад

A specially crafted request could have crashed the Apache HTTP Server ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-c68v-mcv4-56hp

около 3 лет назад

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2019-04309

около 7 лет назад

Уязвимость веб-сервера Apache HTTP Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2017-15710

около 7 лет назад

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2017-15710

около 7 лет назад

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2017-15710

около 7 лет назад

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2017-15710

около 7 лет назад

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29 ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2018-17199

больше 6 лет назад

In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-17199

больше 6 лет назад

In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2018-17199

больше 6 лет назад

In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-1121

ELSA-2020-1121: httpd security, bug fix, and enhancement update (MODERATE)

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2018:1079-1

Security update for apache2

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0901-1

Security update for apache2

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:0879-1

Security update for apache2

около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:1198-1

Security update for apache2

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1161-2

Security update for apache2

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:1161-1

Security update for apache2

около 7 лет назад
ubuntu логотип
CVE-2018-1301

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 5.9
8%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-1301

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 3.7
8%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-1301

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 5.9
8%
Низкий
около 7 лет назад
debian логотип
CVE-2018-1301

A specially crafted request could have crashed the Apache HTTP Server ...

CVSS3: 5.9
8%
Низкий
около 7 лет назад
github логотип
GHSA-c68v-mcv4-56hp

A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.

CVSS3: 5.9
8%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-04309

Уязвимость веб-сервера Apache HTTP Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 3.7
8%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2017-15710

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.

CVSS3: 7.5
12%
Средний
около 7 лет назад
redhat логотип
CVE-2017-15710

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.

CVSS3: 5.9
12%
Средний
около 7 лет назад
nvd логотип
CVE-2017-15710

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.

CVSS3: 7.5
12%
Средний
около 7 лет назад
debian логотип
CVE-2017-15710

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29 ...

CVSS3: 7.5
12%
Средний
около 7 лет назад
ubuntu логотип
CVE-2018-17199

In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.

CVSS3: 7.5
6%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-17199

In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.

CVSS3: 5.4
6%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-17199

In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.

CVSS3: 7.5
6%
Низкий
больше 6 лет назад

Уязвимостей на страницу