Логотип exploitDog
bind:CVE-2019-10097
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-10097

Количество 10

Количество 10

ubuntu логотип

CVE-2019-10097

больше 5 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
EPSS: Средний
redhat логотип

CVE-2019-10097

почти 6 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 6.6
EPSS: Средний
nvd логотип

CVE-2019-10097

больше 5 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
EPSS: Средний
debian логотип

CVE-2019-10097

больше 5 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured ...

CVSS3: 7.2
EPSS: Средний
github логотип

GHSA-x7xg-9vq9-q8xh

около 3 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

EPSS: Средний
fstec логотип

BDU:2019-04285

почти 6 лет назад

Уязвимость модуля mod_remoteip веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.2
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2019:2051-1

почти 6 лет назад

Security update for apache2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2237-1

почти 6 лет назад

Security update for apache2

EPSS: Низкий
rocky логотип

RLSA-2020:4751

больше 4 лет назад

Moderate: httpd:2.4 security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4751

больше 4 лет назад

ELSA-2020-4751: httpd:2.4 security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-10097

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
27%
Средний
больше 5 лет назад
redhat логотип
CVE-2019-10097

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 6.6
27%
Средний
почти 6 лет назад
nvd логотип
CVE-2019-10097

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
27%
Средний
больше 5 лет назад
debian логотип
CVE-2019-10097

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured ...

CVSS3: 7.2
27%
Средний
больше 5 лет назад
github логотип
GHSA-x7xg-9vq9-q8xh

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

27%
Средний
около 3 лет назад
fstec логотип
BDU:2019-04285

Уязвимость модуля mod_remoteip веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 7.2
27%
Средний
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2051-1

Security update for apache2

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2237-1

Security update for apache2

почти 6 лет назад
rocky логотип
RLSA-2020:4751

Moderate: httpd:2.4 security, bug fix, and enhancement update

больше 4 лет назад
oracle-oval логотип
ELSA-2020-4751

ELSA-2020-4751: httpd:2.4 security, bug fix, and enhancement update (MODERATE)

больше 4 лет назад

Уязвимостей на страницу