Apache

HTTP Server

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 10.07.2025 16:56:07
  • Zuletzt bearbeitet 04.11.2025 22:16:03

Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from ...

  • EPSS 0.15%
  • Veröffentlicht 10.07.2025 16:55:20
  • Zuletzt bearbeitet 04.11.2025 22:16:04

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used ...

  • EPSS 0.33%
  • Veröffentlicht 10.07.2025 16:54:15
  • Zuletzt bearbeitet 04.11.2025 22:16:03

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or respons...

  • EPSS 0.32%
  • Veröffentlicht 10.07.2025 16:53:13
  • Zuletzt bearbeitet 04.11.2025 22:16:02

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-20...

  • EPSS 0.52%
  • Veröffentlicht 29.04.2025 11:56:50
  • Zuletzt bearbeitet 28.07.2025 14:15:27

A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes c...

  • EPSS 0.47%
  • Veröffentlicht 18.07.2024 10:15:03
  • Zuletzt bearbeitet 21.11.2024 09:31:48

SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. 

  • EPSS 26.57%
  • Veröffentlicht 18.07.2024 10:15:02
  • Zuletzt bearbeitet 14.03.2025 18:15:29

A partial fix for  CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly...

  • EPSS 0.25%
  • Veröffentlicht 04.07.2024 09:15:04
  • Zuletzt bearbeitet 01.07.2025 20:27:13

A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source ...

  • EPSS 1.35%
  • Veröffentlicht 01.07.2024 19:15:05
  • Zuletzt bearbeitet 03.11.2025 22:17:01

null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.

  • EPSS 2.52%
  • Veröffentlicht 01.07.2024 19:15:05
  • Zuletzt bearbeitet 03.11.2025 22:17:06

Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.