9.8
CVSSv3

CVE-2022-23943

Published: 14/03/2022 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an malicious user to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server

fedoraproject fedora 34

fedoraproject fedora 35

fedoraproject fedora 36

debian debian linux 9.0

oracle http server 12.2.1.3.0

oracle http server 12.2.1.4.0

oracle zfs storage appliance kit 8.8

Vendor Advisories

Several security issues were fixed in Apache HTTP Server ...
Several security issues were fixed in Apache HTTP Server ...
A flaw was found in the mod_lua module of httpd A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function The highest treat of this vulnerability is availability (CVE-2022-22719) A flaw was found in httpd The inbound connection is not closed when it fails to disca ...
Synopsis Moderate: httpd:24 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for the httpd:24 module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update ...
Synopsis Moderate: httpd security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for httpd is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this ...
Synopsis Moderate: httpd24-httpd security and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for httpd24-httpd is now available for Red Hat Software CollectionsRed Hat Product Security has rated ...
Synopsis Moderate: Red Hat JBoss Core Services Apache HTTP Server 2451 SP1 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update is now available for Red Hat JBoss Core ServicesRed Hat Product Securi ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2451 SP1 security update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Core ServicesRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base sco ...
A flaw was found in the mod_lua module of httpd A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function The highest treat of this vulnerability is availability (CVE-2022-22719) A flaw was found in httpd The inbound connection is not closed when it fails to disca ...
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data This issue affects Apache HTTP Server 24 version 2452 and prior versions ...
A flaw was found in the mod_lua module of httpd A crafted request body can cause a read to a random memory area due to an uninitialized value in functions called by the parsebody function The highest treat of this vulnerability is availability (CVE-2022-22719) A flaw was found in httpd The inbound connection is not closed when it fails to disca ...
Tenablesc leverages third-party software to help provide underlying functionality Several of the third-party components were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution, and in line with best practice, Tenable has upgraded the bundled components to address the potential impact ...
Tenablesc leverages third-party software to help provide underlying functionality Two of the third-party components (Apache and OpenSSL) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution, and in line with best practice, Tenable has upgraded the bundled components to address the ...

ICS Advisories