Логотип exploitDog
bind:CVE-2019-17656
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-17656

Количество 3

Количество 3

nvd логотип

CVE-2019-17656

почти 5 лет назад

A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-5r87-vv22-xx2p

больше 3 лет назад

A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

EPSS: Низкий
fstec логотип

BDU:2022-06543

больше 5 лет назад

Уязвимость httpd-демона операционных систем FortiOS и прокси-сервера для защиты от интернет-атак FortiProxy, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-17656

A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

CVSS3: 5.4
3%
Низкий
почти 5 лет назад
github логотип
GHSA-5r87-vv22-xx2p

A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06543

Уязвимость httpd-демона операционных систем FortiOS и прокси-сервера для защиты от интернет-атак FortiProxy, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.4
3%
Низкий
больше 5 лет назад

Уязвимостей на страницу