Apache

Apache Http Server

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 10.07.2025 16:56:07
  • Zuletzt bearbeitet 04.11.2025 22:16:03

Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from ...

  • EPSS 0.1%
  • Veröffentlicht 10.07.2025 16:55:20
  • Zuletzt bearbeitet 04.11.2025 22:16:04

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used ...

  • EPSS 0.21%
  • Veröffentlicht 10.07.2025 16:54:15
  • Zuletzt bearbeitet 04.11.2025 22:16:03

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or respons...

  • EPSS 0.28%
  • Veröffentlicht 10.07.2025 16:53:13
  • Zuletzt bearbeitet 04.11.2025 22:16:02

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-20...

  • EPSS 0.27%
  • Veröffentlicht 04.07.2024 09:15:04
  • Zuletzt bearbeitet 01.07.2025 20:27:13

A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source ...

  • EPSS 2.59%
  • Veröffentlicht 01.07.2024 19:15:05
  • Zuletzt bearbeitet 03.11.2025 22:17:06

Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Warnung Medienbericht
  • EPSS 93.86%
  • Veröffentlicht 01.07.2024 19:15:04
  • Zuletzt bearbeitet 17.11.2025 21:49:55

Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resultin...

  • EPSS 87.86%
  • Veröffentlicht 01.07.2024 19:15:04
  • Zuletzt bearbeitet 01.07.2025 20:25:09

Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version ...

  • EPSS 90.49%
  • Veröffentlicht 01.07.2024 19:15:04
  • Zuletzt bearbeitet 01.07.2025 20:24:46

SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations t...

  • EPSS 0.15%
  • Veröffentlicht 01.07.2024 19:15:03
  • Zuletzt bearbeitet 06.11.2025 22:26:05

Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.