Количество 16
Количество 16

BDU:2021-00779
Уязвимость реализации механизма HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или привести к неверной конфигурации сервера

CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.

CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.

CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.

CVE-2020-11993
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enab ...
GHSA-89mq-r3q6-9q3q
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.

openSUSE-SU-2020:1792-1
Security update for apache2

SUSE-SU-2020:3067-1
Security update for apache2

openSUSE-SU-2020:1293-1
Security update for apache2

openSUSE-SU-2020:1285-1
Security update for apache2

SUSE-SU-2020:2450-1
Security update for apache2

SUSE-SU-2020:2344-1
Security update for apache2

SUSE-SU-2020:2311-1
Security update for apache2

RLSA-2021:1809
Moderate: httpd:2.4 security, bug fix, and enhancement update
ELSA-2021-1809
ELSA-2021-1809: httpd:2.4 security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2021-00779 Уязвимость реализации механизма HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или привести к неверной конфигурации сервера | CVSS3: 7.3 | 39% Средний | почти 5 лет назад |
![]() | CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | почти 5 лет назад |
![]() | CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | почти 5 лет назад |
![]() | CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | почти 5 лет назад |
![]() | CVSS3: 7.5 | 39% Средний | почти 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enab ... | CVSS3: 7.5 | 39% Средний | почти 5 лет назад | |
GHSA-89mq-r3q6-9q3q Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | около 3 лет назад | |
![]() | openSUSE-SU-2020:1792-1 Security update for apache2 | больше 4 лет назад | ||
![]() | SUSE-SU-2020:3067-1 Security update for apache2 | больше 4 лет назад | ||
![]() | openSUSE-SU-2020:1293-1 Security update for apache2 | почти 5 лет назад | ||
![]() | openSUSE-SU-2020:1285-1 Security update for apache2 | почти 5 лет назад | ||
![]() | SUSE-SU-2020:2450-1 Security update for apache2 | почти 5 лет назад | ||
![]() | SUSE-SU-2020:2344-1 Security update for apache2 | почти 5 лет назад | ||
![]() | SUSE-SU-2020:2311-1 Security update for apache2 | почти 5 лет назад | ||
![]() | RLSA-2021:1809 Moderate: httpd:2.4 security, bug fix, and enhancement update | около 4 лет назад | ||
ELSA-2021-1809 ELSA-2021-1809: httpd:2.4 security, bug fix, and enhancement update (MODERATE) | около 4 лет назад |
Уязвимостей на страницу