CVE-2019-10092

Source
https://cve.org/CVERecord?id=CVE-2019-10092
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10092.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-10092
Downstream
Related
Published
2019-09-26T16:15:10.613Z
Modified
2026-02-24T11:30:31.011475Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.

References

Affected packages

Git / github.com/checkstyle/checkstyle

Affected ranges

Type
GIT
Repo
https://github.com/checkstyle/checkstyle
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other
bcel
release1_1
release1_2
release1_3
release1_4
release2_0
release2_2
release2_4
release3_0
release3_1
release3_2
release3_3
release3_4
release4_0
release4_0_beta_1
release4_0_beta_2
release4_0_beta_3
release4_0_beta_4
release4_0_beta_5
release4_1
release4_2
release4_3
release4_4
release5_3
release5_4
v2-branch_lmp

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-10092.json"