Apache

HTTP Server

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.32%
  • Veröffentlicht 09.03.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 02:59:40

Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.

Exploit
  • EPSS 93.84%
  • Veröffentlicht 18.09.2017 15:29:00
  • Zuletzt bearbeitet 04.11.2025 16:15:41

Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2...

  • EPSS 41.68%
  • Veröffentlicht 27.07.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated en...

  • EPSS 39.61%
  • Veröffentlicht 27.07.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.

  • EPSS 8.41%
  • Veröffentlicht 27.07.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in...

  • EPSS 38.38%
  • Veröffentlicht 26.07.2017 21:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.

  • EPSS 53.22%
  • Veröffentlicht 13.07.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial ke...

  • EPSS 11.13%
  • Veröffentlicht 13.07.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.

  • EPSS 9.44%
  • Veröffentlicht 20.06.2017 01:29:00
  • Zuletzt bearbeitet 04.11.2025 16:15:38

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.

  • EPSS 33.1%
  • Veröffentlicht 20.06.2017 01:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.