Количество 12
Количество 12

CVE-2016-5387
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVE-2016-5387
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVE-2016-5387
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
CVE-2016-5387
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 ...

openSUSE-SU-2016:1824-1
Security update for apache2

SUSE-SU-2016:2090-1
Security update for apache2

SUSE-SU-2016:1819-1
Security update for apache2

SUSE-SU-2016:1818-1
Security update for apache2
GHSA-9hqr-6p2v-pfp2
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
ELSA-2016-1422
ELSA-2016-1422: httpd security and bug fix update (IMPORTANT)
ELSA-2016-1421
ELSA-2016-1421: httpd security update (IMPORTANT)

openSUSE-SU-2016:2115-1
Security update for apache2-mod_fcgid
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2016-5387 The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability. | CVSS3: 8.1 | 72% Высокий | около 9 лет назад |
![]() | CVE-2016-5387 The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability. | CVSS3: 5 | 72% Высокий | около 9 лет назад |
![]() | CVE-2016-5387 The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability. | CVSS3: 8.1 | 72% Высокий | около 9 лет назад |
CVE-2016-5387 The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 ... | CVSS3: 8.1 | 72% Высокий | около 9 лет назад | |
![]() | openSUSE-SU-2016:1824-1 Security update for apache2 | 72% Высокий | около 9 лет назад | |
![]() | SUSE-SU-2016:2090-1 Security update for apache2 | 72% Высокий | около 9 лет назад | |
![]() | SUSE-SU-2016:1819-1 Security update for apache2 | 72% Высокий | около 9 лет назад | |
![]() | SUSE-SU-2016:1818-1 Security update for apache2 | 72% Высокий | около 9 лет назад | |
GHSA-9hqr-6p2v-pfp2 The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability. | CVSS3: 8.1 | 72% Высокий | больше 3 лет назад | |
ELSA-2016-1422 ELSA-2016-1422: httpd security and bug fix update (IMPORTANT) | около 9 лет назад | |||
ELSA-2016-1421 ELSA-2016-1421: httpd security update (IMPORTANT) | около 9 лет назад | |||
![]() | openSUSE-SU-2016:2115-1 Security update for apache2-mod_fcgid | около 9 лет назад |
Уязвимостей на страницу