Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-11984

EPSS 79.68% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-11984

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache HTTP Server 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.4.32版本至2.4.44版本中的mod_uwsgi存在缓冲区错误漏洞。攻击者可利用该漏洞获取信息并可能执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-Apache HTTP Server 2.4.32 to 2.4.44 -

II. Public POCs for CVE-2020-11984

#POC DescriptionSource LinkShenlong Link
1Apache HTTP Server 2.4.32 to 2.4.44 contains an info disclosure and possible remote code execution caused by a vulnerability in mod_proxy_uwsgi, letting remote attackers access sensitive information and potentially execute arbitrary code, exploit requires sending crafted requests. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-11984.yamlPOC Details
2Nonehttps://github.com/masahiro331/CVE-2020-11984POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-11984

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-08-07 · 25 CVEs total

CVE-2020-15054TP-Link USB Network Server TL-PS310U 安全漏洞
CVE-2020-15065Assmann Electronic DIGITUS DA-70254 4-Port Gigabit Network Hub 输入验证错误漏洞
CVE-2020-15064Assmann Electronic DIGITUS DA-70254 4-Port Gigabit Network Hub 跨站脚本漏洞
CVE-2020-15063Assmann Electronic DIGITUS DA-70254 4-Port Gigabit Network Hub 授权问题漏洞
CVE-2020-15062Assmann Electronic DIGITUS DA-70254 4-Port Gigabit Network Hub 安全漏洞
CVE-2020-15061Lindy 42633 4-Port USB 2.0 Gigabit Network Server 输入验证错误漏洞
CVE-2020-15060Lindy 42633 4-Port USB 2.0 Gigabit Network Server 跨站脚本漏洞
CVE-2020-15059Lindy 42633 4-Port USB 2.0 Gigabit Network Server 授权问题漏洞
CVE-2020-15058Lindy 42633 4-Port USB 2.0 Gigabit Network Server 安全漏洞
CVE-2020-15057TP-Link USB Network Server TL-PS310U 输入验证错误漏洞
CVE-2020-15056TP-Link USB Network Server TL-PS310U 跨站脚本漏洞
CVE-2020-15055TP-Link USB Network Server TL-PS310U 授权问题漏洞
CVE-2020-16168多款Roboteam Home产品访问控制错误漏洞
CVE-2020-15480PassMark Software BurnInTest、OSForensics和PerformanceTest 缓冲区错误漏洞
CVE-2020-15479PassMark Software BurnInTest、OSForensics和PerformanceTest 缓冲区错误漏洞
CVE-2020-17352Sophos XG Firewall 操作系统命令注入漏洞
CVE-2020-15907Mahara 跨站脚本漏洞
CVE-2020-16167多款Roboteam Home产品访问控制错误漏洞
CVE-2020-16169多款Roboteam Home产品授权问题漏洞
CVE-2020-13376SecurEnvoy SecureMail 路径遍历漏洞

Showing top 20 of 25 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-11984

No comments yet


Leave a comment