Логотип exploitDog
bind:"CVE-2024-43204"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-43204"

Количество 12

Количество 12

ubuntu логотип

CVE-2024-43204

около 1 месяца назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-43204

около 1 месяца назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2024-43204

около 1 месяца назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2024-43204

около 1 месяца назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-43204

около 1 месяца назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-q2wp-r77c-3cw8

около 1 месяца назад

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-08957

около 1 года назад

Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 5.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02685-1

17 дней назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02684-1

17 дней назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02683-1

17 дней назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02682-1

17 дней назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02565-1

22 дня назад

Security update for apache2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
redhat логотип
CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 5.4
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
msrc логотип
CVSS3: 7.5
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to ...

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
github логотип
GHSA-q2wp-r77c-3cw8

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-08957

Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю осуществить SSRF-атаку

CVSS3: 5.4
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:02685-1

Security update for apache2

17 дней назад
suse-cvrf логотип
SUSE-SU-2025:02684-1

Security update for apache2

17 дней назад
suse-cvrf логотип
SUSE-SU-2025:02683-1

Security update for apache2

17 дней назад
suse-cvrf логотип
SUSE-SU-2025:02682-1

Security update for apache2

17 дней назад
suse-cvrf логотип
SUSE-SU-2025:02565-1

Security update for apache2

22 дня назад

Уязвимостей на страницу