7.5
CVSSv3

CVE-2023-31122

CVSSv4: NA | CVSSv3: 7.5 | CVSSv2: NA | VMScore: 850 | EPSS: 0.00359 | KEV: Not Included
Published: 23/10/2023 Updated: 21/11/2024

Vulnerability Summary

Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: up to and including 2.4.57.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server

fedoraproject fedora 38

Vendor Advisories

Out-of-bounds Read vulnerability in mod_macro of Apache HTTP ServerThis issue affects Apache HTTP Server: through 2457 (CVE-2023-31122) A flaw was found in httpd This flaw allows an attacker opening an HTTP/2 connection with an initial window size of 0 to block handling of that connection indefinitely in the Apache HTTP Server This vulnerabil ...
Out-of-bounds Read vulnerability in mod_macro of Apache HTTP ServerThis issue affects Apache HTTP Server: through 2457 (CVE-2023-31122) A flaw was found in httpd This flaw allows an attacker opening an HTTP/2 connection with an initial window size of 0 to block handling of that connection indefinitely in the Apache HTTP Server This vulnerabil ...

Github Repositories

shodan-host-recon Shodan host Recon é um script em Python para coleta rápida e estruturada de informações públicas sobre um host utilizando scraping da página de detalhes do Shodan (não utiliza API) O script extrai automaticamente: Informações gerais (ISP, localização, sistema operacional, etc) Dom&

HTTP/2 vulnerabilities This operator uses the latest version of docker image with Apache HTTPD server v2458 on date 2/12/2023 That version contains fixes for CVE-2023-45802, CVE-2023-43622 and CVE-2023-31122 About Apacheweb operator Apacheweb operator is powered by Apache HTTP server Apacheweb operator provides basic features of Apache HTTP server - web server and load balan

Denial of Service (DoS) Medium Article Demonstration Description Thisproject serves as a Proof of Concept (POC) for exploiting a Denial of Service (DoS) vulnerability, CVE-2023–43622, in Apache HTTP Server versions prior to 2458 Utilizing a Python script, the project demonstrates how manipulating the window size in HTTP/2 connections can lead to server resource exhaust

rapport pentest d'un site web de gestion de secrets

Auteur Année Kalidou - @aethelwulf - kalidoume 2024 Pentest - Sécurité Applicative Rapport d'audit pentest Présenté par : Kalidou DIA Plan Introduction I Énumération II Détection de vulnérabilités III Exploitation des vulnérabilités Introduction C