Apache

HTTP Server

301 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 42.56%
  • Published 10.06.2021 07:15:07
  • Last modified 21.11.2024 05:56:41

In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow

  • EPSS 24.56%
  • Published 10.06.2021 07:15:07
  • Last modified 21.11.2024 06:04:21

Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'

  • EPSS 75.82%
  • Published 07.08.2020 16:15:12
  • Last modified 21.11.2024 05:40:45

Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via ...

Exploit
  • EPSS 76.31%
  • Published 07.08.2020 16:15:11
  • Last modified 21.11.2024 04:59:02

Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE

  • EPSS 34.09%
  • Published 07.08.2020 16:15:11
  • Last modified 21.11.2024 04:59:03

IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in...

Exploit
  • EPSS 38.85%
  • Published 07.08.2020 16:15:11
  • Last modified 01.05.2025 15:40:19

Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLev...

  • EPSS 11.3%
  • Published 02.04.2020 00:15:13
  • Last modified 21.11.2024 05:11:37

In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.

  • EPSS 41.87%
  • Published 01.04.2020 20:15:15
  • Last modified 21.11.2024 05:11:38

In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.

  • EPSS 47.89%
  • Published 26.09.2019 16:15:10
  • Last modified 21.11.2024 04:18:21

In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.

Exploit
  • EPSS 82.38%
  • Published 26.09.2019 16:15:10
  • Last modified 21.11.2024 04:18:23

In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only ...