Логотип exploitDog
bind:CVE-2016-5387
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-5387

Количество 12

Количество 12

ubuntu логотип

CVE-2016-5387

около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
EPSS: Высокий
redhat логотип

CVE-2016-5387

около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 5
EPSS: Высокий
nvd логотип

CVE-2016-5387

около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
EPSS: Высокий
debian логотип

CVE-2016-5387

около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 ...

CVSS3: 8.1
EPSS: Высокий
suse-cvrf логотип

openSUSE-SU-2016:1824-1

около 9 лет назад

Security update for apache2

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2016:2090-1

около 9 лет назад

Security update for apache2

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2016:1819-1

около 9 лет назад

Security update for apache2

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2016:1818-1

около 9 лет назад

Security update for apache2

EPSS: Высокий
github логотип

GHSA-9hqr-6p2v-pfp2

больше 3 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
EPSS: Высокий
oracle-oval логотип

ELSA-2016-1422

около 9 лет назад

ELSA-2016-1422: httpd security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2016-1421

около 9 лет назад

ELSA-2016-1421: httpd security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:2115-1

около 9 лет назад

Security update for apache2-mod_fcgid

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-5387

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
72%
Высокий
около 9 лет назад
redhat логотип
CVE-2016-5387

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 5
72%
Высокий
около 9 лет назад
nvd логотип
CVE-2016-5387

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
72%
Высокий
около 9 лет назад
debian логотип
CVE-2016-5387

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 ...

CVSS3: 8.1
72%
Высокий
около 9 лет назад
suse-cvrf логотип
openSUSE-SU-2016:1824-1

Security update for apache2

72%
Высокий
около 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:2090-1

Security update for apache2

72%
Высокий
около 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:1819-1

Security update for apache2

72%
Высокий
около 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:1818-1

Security update for apache2

72%
Высокий
около 9 лет назад
github логотип
GHSA-9hqr-6p2v-pfp2

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
72%
Высокий
больше 3 лет назад
oracle-oval логотип
ELSA-2016-1422

ELSA-2016-1422: httpd security and bug fix update (IMPORTANT)

около 9 лет назад
oracle-oval логотип
ELSA-2016-1421

ELSA-2016-1421: httpd security update (IMPORTANT)

около 9 лет назад
suse-cvrf логотип
openSUSE-SU-2016:2115-1

Security update for apache2-mod_fcgid

около 9 лет назад

Уязвимостей на страницу