CVE-2019-0196
- EPSS 9.66%
- Veröffentlicht 11.06.2019 22:29:03
- Zuletzt bearbeitet 21.11.2024 04:16:27
A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request ...
CVE-2019-0220
- EPSS 20.57%
- Veröffentlicht 11.06.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:31
A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions...
CVE-2019-0211
- EPSS 89.45%
- Veröffentlicht 08.04.2019 22:29:00
- Zuletzt bearbeitet 27.10.2025 17:37:51
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with...
CVE-2019-0217
- EPSS 43.02%
- Veröffentlicht 08.04.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:30
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictio...
CVE-2019-0215
- EPSS 8.81%
- Veröffentlicht 08.04.2019 20:29:10
- Zuletzt bearbeitet 21.11.2024 04:16:30
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
CVE-2018-17189
- EPSS 4.39%
- Veröffentlicht 30.01.2019 22:29:00
- Zuletzt bearbeitet 21.11.2024 03:54:03
In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_htt...
CVE-2018-17199
- EPSS 10.29%
- Veröffentlicht 30.01.2019 22:29:00
- Zuletzt bearbeitet 21.11.2024 03:54:04
In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session...
CVE-2019-0190
- EPSS 18.92%
- Veröffentlicht 30.01.2019 22:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:26
A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server ve...
CVE-2018-11763
- EPSS 17.4%
- Veröffentlicht 25.09.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:43:58
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitiga...
CVE-2016-4975
- EPSS 73.01%
- Veröffentlicht 14.08.2018 12:29:00
- Zuletzt bearbeitet 21.11.2024 02:53:20
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or valu...