Sec Feed Reader
  • Alle Eintraege
  • CVEs
  • Dashboards
    Alle Dashboards Ueberblick ISO/IEC 27001:2022 — Referenz-Sicherheitslage
  • Filter
    Erweiterte Filter Nur Critical News Server-Operations Desktop-Software
  • Quellen
    Alle Quellen Apache ASF Apache HTTP Server Security (httpd.org JSON) BSI CSW BleepingComputer CERT-Bund (BSI) CERT-EU – Threat Intelligence CERT/CC Vulnerability Notes CISA Advisories CISA ICS Advisories CISA – Known Exploited Vulnerabilities (KEV) Debian PTS — linux (Quellpaket) Debian Security Debian Security Tracker — linux (CVEs) Full Disclosure Golem Security Google Project Zero Hacker News Sec Heise Security Moodle Security Announcements Moodle — GitHub Releases NCSC UK – News Nginx Security OWASP ModSecurity Releases OpenKRITIS PHP Security (php/php-src GHSA) PostgreSQL Project Black — Research Blog SANS Internet Storm Center Security-Insider Tarnkappe.info The Hacker News Zero Day Initiative (Published) netzpolitik.org
  • Bookmarks
  • Suche

CVE-2022-28614

Kenndaten

  • CVSS: nicht verfuegbar
  • EPSS (FIRST): Score —, Perzentil —
  • EPSS-Stand: —
  • Veroeffentlicht (CVE.org): —
  • Zuletzt angereichert: —
  • Externe Referenzen (Anzahl): 0
  • Anreicherungs-Plugins (Referenzen): —

Eintraege mit Bezug zu CVE-2022-28614

apache_httpd_sec

CVE-2022-28614: The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the "ap_rputs" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.

- vendor_advisory
Alle CVEs

Aggregator · SQLPage + PostgreSQL