CVE-2024-43394
- EPSS 0.05%
- Veröffentlicht 10.07.2025 16:56:07
- Zuletzt bearbeitet 04.11.2025 22:16:03
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from ...
CVE-2024-47252
- EPSS 0.15%
- Veröffentlicht 10.07.2025 16:55:20
- Zuletzt bearbeitet 04.11.2025 22:16:04
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used ...
CVE-2024-43204
- EPSS 0.33%
- Veröffentlicht 10.07.2025 16:54:15
- Zuletzt bearbeitet 04.11.2025 22:16:03
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or respons...
CVE-2024-42516
- EPSS 0.32%
- Veröffentlicht 10.07.2025 16:53:13
- Zuletzt bearbeitet 04.11.2025 22:16:02
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-20...
CVE-2025-3891
- EPSS 0.52%
- Veröffentlicht 29.04.2025 11:56:50
- Zuletzt bearbeitet 28.07.2025 14:15:27
A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes c...
CVE-2024-40898
- EPSS 0.47%
- Veröffentlicht 18.07.2024 10:15:03
- Zuletzt bearbeitet 21.11.2024 09:31:48
SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue.
CVE-2024-40725
- EPSS 26.57%
- Veröffentlicht 18.07.2024 10:15:02
- Zuletzt bearbeitet 14.03.2025 18:15:29
A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly...
CVE-2024-39884
- EPSS 0.25%
- Veröffentlicht 04.07.2024 09:15:04
- Zuletzt bearbeitet 01.07.2025 20:27:13
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source ...
CVE-2024-38477
- EPSS 1.35%
- Veröffentlicht 01.07.2024 19:15:05
- Zuletzt bearbeitet 03.11.2025 22:17:01
null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
CVE-2024-39573
- EPSS 2.52%
- Veröffentlicht 01.07.2024 19:15:05
- Zuletzt bearbeitet 03.11.2025 22:17:06
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.