Количество 16
Количество 16
BDU:2021-00779
Уязвимость реализации механизма HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или привести к неверной конфигурации сервера
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns logging statements were made on the wrong connection causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enab ...
GHSA-89mq-r3q6-9q3q
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
openSUSE-SU-2020:1792-1
Security update for apache2
SUSE-SU-2020:3067-1
Security update for apache2
openSUSE-SU-2020:1293-1
Security update for apache2
openSUSE-SU-2020:1285-1
Security update for apache2
SUSE-SU-2020:2450-1
Security update for apache2
SUSE-SU-2020:2344-1
Security update for apache2
SUSE-SU-2020:2311-1
Security update for apache2
RLSA-2021:1809
Moderate: httpd:2.4 security, bug fix, and enhancement update
ELSA-2021-1809
ELSA-2021-1809: httpd:2.4 security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2021-00779 Уязвимость реализации механизма HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или привести к неверной конфигурации сервера | CVSS3: 7.3 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns logging statements were made on the wrong connection causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enab ... | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
GHSA-89mq-r3q6-9q3q Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 3 лет назад | |
openSUSE-SU-2020:1792-1 Security update for apache2 | около 5 лет назад | |||
SUSE-SU-2020:3067-1 Security update for apache2 | около 5 лет назад | |||
openSUSE-SU-2020:1293-1 Security update for apache2 | больше 5 лет назад | |||
openSUSE-SU-2020:1285-1 Security update for apache2 | больше 5 лет назад | |||
SUSE-SU-2020:2450-1 Security update for apache2 | больше 5 лет назад | |||
SUSE-SU-2020:2344-1 Security update for apache2 | больше 5 лет назад | |||
SUSE-SU-2020:2311-1 Security update for apache2 | больше 5 лет назад | |||
RLSA-2021:1809 Moderate: httpd:2.4 security, bug fix, and enhancement update | больше 4 лет назад | |||
ELSA-2021-1809 ELSA-2021-1809: httpd:2.4 security, bug fix, and enhancement update (MODERATE) | больше 4 лет назад |
Уязвимостей на страницу