11273.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 53 行
TXT
53 行
Rule--Sid11273--Summary:This event is generated when an attempt is made to exploit a known vulnerability in Apache.--Impact:Low--Detailed Information:Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.--Affected Systems:Apache Software Foundation Apache 2.0.52--Attack Scenarios:--Ease of Attack:--False Positives:None known.--False Negatives:None known.--Corrective Action:--Contributors:Sourcefire Vulnerability Research TeamThis document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.For more information see http://nvd.nist.gov/--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?