Apache

HTTP Server

301 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 6.15%
  • Published 30.01.2019 22:29:00
  • Last modified 21.11.2024 03:54:03

In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_htt...

  • EPSS 7.33%
  • Published 30.01.2019 22:29:00
  • Last modified 21.11.2024 03:54:04

In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session...

  • EPSS 24.06%
  • Published 30.01.2019 22:29:00
  • Last modified 21.11.2024 04:16:26

A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server ve...

  • EPSS 17.4%
  • Published 25.09.2018 21:29:00
  • Last modified 21.11.2024 03:43:58

In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitiga...

  • EPSS 70.81%
  • Published 14.08.2018 12:29:00
  • Last modified 21.11.2024 02:53:20

Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or valu...

  • EPSS 1.54%
  • Published 26.07.2018 17:29:00
  • Last modified 21.11.2024 03:08:58

A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a res...

  • EPSS 38.97%
  • Published 18.07.2018 14:29:00
  • Last modified 21.11.2024 04:13:05

By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.33).

  • EPSS 14.88%
  • Published 18.06.2018 18:29:00
  • Last modified 21.11.2024 03:59:38

By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.18-2.4.30,2.4.33).

  • EPSS 11.7%
  • Published 26.03.2018 15:29:00
  • Last modified 21.11.2024 03:15:03

In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If th...

  • EPSS 94.17%
  • Published 26.03.2018 15:29:00
  • Last modified 21.11.2024 03:15:04

In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some...