CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
97.0%
Apache HTTP Server web server vulnerability is related to a bounds error in LimitXMLRequestBody. Exploitation
vulnerability could allow an attacker acting remotely to cause memory corruption and execute
arbitrary code on the target system
Apache HTTP Server web server vulnerability is related to improper validation of HTTP requests. Exploitation
the vulnerability could allow a remote attacker to send a specially crafted HTTP request
to the server and forward arbitrary HTTP headers
The Apache HTTP Server web server vulnerability involves a boundary error in the handling of unreliable input in the
mod_sed. Exploitation of the vulnerability could allow an attacker acting remotely to initiate an
Unauthorized writing and execution of arbitrary code on the target system
The Apache HTTP Server web server vulnerability involves the use of an uninitialized value in the
r:parsebody. Exploitation of the vulnerability could allow an attacker acting remotely to pass the
specially crafted data into an application and perform a denial of service (DoS) attack
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
97.0%