CVE-2024-39884
- EPSS 0.12%
- Published 04.07.2024 09:15:04
- Last modified 01.07.2025 20:27:13
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source ...
CVE-2024-34750
- EPSS 16.9%
- Published 03.07.2024 20:15:04
- Last modified 08.08.2025 11:15:27
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active...
CVE-2024-6387
- EPSS 38.58%
- Published 01.07.2024 13:15:06
- Last modified 30.09.2025 13:52:23
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...
CVE-2024-30171
- EPSS 0.06%
- Published 14.05.2024 15:21:52
- Last modified 21.11.2024 09:11:21
An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
CVE-2024-34397
- EPSS 0.1%
- Published 07.05.2024 18:15:08
- Last modified 18.06.2025 14:36:02
An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can ...
CVE-2024-24795
- EPSS 1.22%
- Published 04.04.2024 20:15:08
- Last modified 30.06.2025 12:55:47
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, ...
CVE-2023-38709
- EPSS 5.8%
- Published 04.04.2024 20:15:08
- Last modified 30.06.2025 12:59:08
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
CVE-2024-29131
- EPSS 0.2%
- Published 21.03.2024 09:15:07
- Last modified 01.05.2025 19:13:04
Out-of-bounds Write vulnerability in Apache Commons Configuration.This issue affects Apache Commons Configuration: from 2.0 before 2.10.1. Users are recommended to upgrade to version 2.10.1, which fixes the issue.
CVE-2024-26633
- EPSS 0.02%
- Published 18.03.2024 11:15:09
- Last modified 04.04.2025 14:49:01
In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken. Reading frag_off can only be done if we p...
CVE-2024-28752
- EPSS 0.36%
- Published 15.03.2024 11:15:09
- Last modified 27.06.2025 15:06:40
A SSRF vulnerability using the Aegis DataBinding in versions of Apache CXF before 4.0.4, 3.6.3 and 3.5.8 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type. Users of other data bindings (inclu...