Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-15598

EPSS 3.79% · P88
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-15598

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Trustwave ModSecurity 3.x through 3.0.4 allows denial of service via a special request. NOTE: The discoverer reports "Trustwave has signaled they are disputing our claims." The CVE suggests that there is a security issue with how ModSecurity handles regular expressions that can result in a Denial of Service condition. The vendor does not consider this as a security issue because1) there is no default configuration issue here. An attacker would need to know that a rule using a potentially problematic regular expression was in place, 2) the attacker would need to know the basic nature of the regular expression itself to exploit any resource issues. It's well known that regular expression usage can be taxing on system resources regardless of the use case. It is up to the administrator to decide on when it is appropriate to trade resources for potential security benefit
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ModSecurity 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ModSecurity是一个入侵检测、阻止的引擎可以作为Apache Web服务器的一个模块或单独的应用程序来运行,为增强Web应用程序的安全性和保护Web应用程序避免遭受来自已知与未知的攻击。 Trustwave ModSecurity 3.x 系列至3.0.4版本存在安全漏洞,攻击者借助该漏洞可以触发拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-15598

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-15598

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-10-06 · 51 CVEs total

CVE-2020-77419.9 CRITICALCross-site Scripting (XSS)
CVE-2020-77398.2 HIGHServer-side Request Forgery (SSRF)
CVE-2020-77408.2 HIGHServer-side Request Forgery (SSRF)
CVE-2020-87827.5 HIGHALEOS LAN-Side RPC Service Remote Code Execution
CVE-2020-24218IPTV H.264/H.265 video 信任管理问题漏洞
CVE-2020-25643Linux kernel 输入验证错误漏洞
CVE-2020-26570OpenSC 缓冲区错误漏洞
CVE-2020-25613Ruby 环境问题漏洞
CVE-2020-26572OpenSC 缓冲区错误漏洞
CVE-2020-26571OpenSC 缓冲区错误漏洞
CVE-2020-25637Red Hat libvirt 资源管理错误漏洞
CVE-2020-24216IPTV/H.264/H.265 video 默认配置问题漏洞
CVE-2020-24217IPTV H.264/H.265 video 访问控制错误漏洞
CVE-2020-24215IPTV/H.264/H.265 video 信任管理问题漏洞
CVE-2020-24219IPTV H.264/H.265 video 路径遍历漏洞
CVE-2020-25641Linux kernel 安全漏洞
CVE-2020-7465MPD 缓冲区错误漏洞
CVE-2020-7466MPD 缓冲区错误漏洞
CVE-2020-8781Sierra Wireless ALEOS 输入验证错误漏洞
CVE-2020-25743QEMU 代码问题漏洞

Showing top 20 of 51 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-15598

No comments yet


Leave a comment