- EPSS 46.34%
- Veröffentlicht 03.05.2022 16:15:18
- Zuletzt bearbeitet 13.08.2025 14:15:28
The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execut...
CVE-2022-22720
- EPSS 33.37%
- Veröffentlicht 14.03.2022 11:15:09
- Zuletzt bearbeitet 21.11.2024 06:47:18
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
CVE-2022-22721
- EPSS 19.47%
- Veröffentlicht 14.03.2022 11:15:09
- Zuletzt bearbeitet 21.11.2024 06:47:19
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2021-4160
- EPSS 0.3%
- Veröffentlicht 28.01.2022 22:15:15
- Zuletzt bearbeitet 21.11.2024 06:37:02
There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlik...
CVE-2021-45105
- EPSS 65.66%
- Veröffentlicht 18.12.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:31:58
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service wh...
- EPSS 94.43%
- Veröffentlicht 16.09.2021 15:15:07
- Zuletzt bearbeitet 16.05.2025 15:27:13
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2021-2351
- EPSS 3.54%
- Veröffentlicht 21.07.2021 15:15:21
- Zuletzt bearbeitet 21.11.2024 06:02:56
Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracl...
CVE-2021-33503
- EPSS 0.86%
- Veröffentlicht 29.06.2021 11:15:07
- Zuletzt bearbeitet 21.11.2024 06:08:58
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed ...
CVE-2021-31618
- EPSS 18.52%
- Veröffentlicht 15.06.2021 09:15:07
- Zuletzt bearbeitet 21.11.2024 06:06:02
Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is se...
CVE-2019-17567
- EPSS 9.56%
- Veröffentlicht 10.06.2021 07:15:07
- Zuletzt bearbeitet 21.11.2024 04:32:32
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to p...