Apache

HTTP Server

317 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 30.77%
  • Veröffentlicht 20.06.2017 01:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.

  • EPSS 62.78%
  • Veröffentlicht 20.06.2017 01:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacke...

Exploit
  • EPSS 30.06%
  • Veröffentlicht 20.06.2017 01:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.

Exploit
  • EPSS 68.26%
  • Veröffentlicht 05.12.2016 19:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via cr...

  • EPSS 60.28%
  • Veröffentlicht 19.07.2016 02:00:19
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an app...

  • EPSS 17.36%
  • Veröffentlicht 06.07.2016 14:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restri...

  • EPSS 41.51%
  • Veröffentlicht 06.07.2016 14:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Apache HTTP Server 2.4.17 and 2.4.18, when mod_http2 is enabled, does not limit the number of simultaneous stream workers for a single HTTP/2 connection, which allows remote attackers to cause a denial of service (stream-processing outage) via mo...

  • EPSS 9.49%
  • Veröffentlicht 20.07.2015 23:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote...

  • EPSS 28.34%
  • Veröffentlicht 20.07.2015 23:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large c...

  • EPSS 10.61%
  • Veröffentlicht 20.07.2015 23:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending...