Apache

HTTP Server

302 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 05.12.2025 13:40:39
  • Zuletzt bearbeitet 08.12.2025 19:36:05

Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recomme...

  • EPSS 0.18%
  • Veröffentlicht 23.07.2025 13:19:25
  • Zuletzt bearbeitet 04.11.2025 22:16:27

A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests evaluating as "true". Users are recommended to upgrade to version 2.4.65, which fixes the issue.

  • EPSS 0.32%
  • Veröffentlicht 10.07.2025 16:59:06
  • Zuletzt bearbeitet 04.11.2025 22:16:21

Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue.

  • EPSS 0.08%
  • Veröffentlicht 10.07.2025 16:58:23
  • Zuletzt bearbeitet 04.11.2025 22:16:18

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enab...

  • EPSS 0.35%
  • Veröffentlicht 10.07.2025 16:57:40
  • Zuletzt bearbeitet 04.11.2025 22:16:18

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is co...

  • EPSS 0.09%
  • Veröffentlicht 10.07.2025 16:56:53
  • Zuletzt bearbeitet 04.11.2025 22:16:06

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual host...

  • EPSS 0.11%
  • Veröffentlicht 10.07.2025 16:56:07
  • Zuletzt bearbeitet 04.11.2025 22:16:03

Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from ...

  • EPSS 0.1%
  • Veröffentlicht 10.07.2025 16:55:20
  • Zuletzt bearbeitet 04.11.2025 22:16:04

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used ...

  • EPSS 0.21%
  • Veröffentlicht 10.07.2025 16:54:15
  • Zuletzt bearbeitet 04.11.2025 22:16:03

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or respons...

  • EPSS 0.28%
  • Veröffentlicht 10.07.2025 16:53:13
  • Zuletzt bearbeitet 04.11.2025 22:16:02

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-20...