Количество 14
Количество 14
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
CVE-2017-9798
Apache httpd allows remote attackers to read secret data from process ...
openSUSE-SU-2017:2549-1
Security update for apache2
SUSE-SU-2017:2718-1
Security update for apache2
SUSE-SU-2017:2542-1
Security update for apache2
GHSA-jxf6-fx3m-8x2r
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
ELSA-2017-2882
ELSA-2017-2882: httpd security update (MODERATE)
BDU:2018-00103
Уязвимость функции ap_limit_section httpd-демона веб-сервера Apache HTTP Server, позволяющая нарушителю получить доступ к данным из памяти процесса
ELSA-2017-2972
ELSA-2017-2972: httpd security update (MODERATE)
SUSE-SU-2017:2756-1
Security update for apache2
SUSE-SU-2017:2907-1
Security update for apache2
openSUSE-SU-2018:1057-1
Security update for virtualbox
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-9798 Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. | CVSS3: 7.5 | 94% Критический | около 8 лет назад | |
CVE-2017-9798 Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. | CVSS3: 5.9 | 94% Критический | около 8 лет назад | |
CVE-2017-9798 Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. | CVSS3: 7.5 | 94% Критический | около 8 лет назад | |
CVE-2017-9798 Apache httpd allows remote attackers to read secret data from process ... | CVSS3: 7.5 | 94% Критический | около 8 лет назад | |
openSUSE-SU-2017:2549-1 Security update for apache2 | 94% Критический | около 8 лет назад | ||
SUSE-SU-2017:2718-1 Security update for apache2 | 94% Критический | около 8 лет назад | ||
SUSE-SU-2017:2542-1 Security update for apache2 | 94% Критический | около 8 лет назад | ||
GHSA-jxf6-fx3m-8x2r Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c. | CVSS3: 7.5 | 94% Критический | больше 3 лет назад | |
ELSA-2017-2882 ELSA-2017-2882: httpd security update (MODERATE) | около 8 лет назад | |||
BDU:2018-00103 Уязвимость функции ap_limit_section httpd-демона веб-сервера Apache HTTP Server, позволяющая нарушителю получить доступ к данным из памяти процесса | CVSS3: 5.3 | 94% Критический | около 8 лет назад | |
ELSA-2017-2972 ELSA-2017-2972: httpd security update (MODERATE) | около 8 лет назад | |||
SUSE-SU-2017:2756-1 Security update for apache2 | около 8 лет назад | |||
SUSE-SU-2017:2907-1 Security update for apache2 | около 8 лет назад | |||
openSUSE-SU-2018:1057-1 Security update for virtualbox | больше 7 лет назад |
Уязвимостей на страницу