Cherokee Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability - CVE-2019-20799
In Cherokee through 1.2.104 multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.
In Cherokee through 1.2.104 multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.