CVSS Base Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Detection Type: Remote Banner Unreliable
Solution Type: Vendor Patch
Summary: Apache HTTP server is prone to a memory access vulnerability.
Technical Details: Using fuzzed network input, the http/2 session handling could
be made to read memory after being freed during connection shutdown.
Detection Method: Checks if a vulnerable version is present on the target host.
Affected Versions: Apache HTTP server version 2.4.18 to 2.4.39.
Recommendations: Update to version 2.4.41 or later.
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
WordPress Admin Columns plugin <= 3.4.6 CSV Injection Vulnerability
HP Printers Multiple Vulnerabilities (HPSBPI03630)
Debian LTS Advisory ([SECURITY] [DLA 1986-1] ruby-haml security update)
Debian LTS Advisory ([SECURITY] [DLA 1987-1] firefox-esr security update)
Debian LTS Advisory ([SECURITY] [DLA 1984-1] gdal security update)
Avast Antivirus <= 19.3.2369 XSS Vulnerability (Windows)
AVG Antivirus <= 19.3.3084 XSS Vulnerability (Windows)
Debian LTS Advisory ([SECURITY] [DLA 1985-1] djvulibre security update)
Debian Security Advisory DSA 4561-1 (fribidi - security update)
Forcepoint Email Security Detection (HTTP)
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.