Количество 18
Количество 18
ELSA-2015-1667
ELSA-2015-1667: httpd security update (MODERATE)

SUSE-SU-2015:1851-1
Security update for apache2
ELSA-2015-1666
ELSA-2015-1666: httpd24-httpd security update (MODERATE)

CVE-2015-3185
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVE-2015-3185
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVE-2015-3185
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
CVE-2015-3185
The ap_some_auth_required function in server/request.c in the Apache H ...

CVE-2015-3183
The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.

CVE-2015-3183
The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.

CVE-2015-3183
The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
CVE-2015-3183
The chunked transfer coding implementation in the Apache HTTP Server b ...
GHSA-5fv4-m5x3-j32p
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

BDU:2015-10929
Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю обойти существующие ограничения доступа

SUSE-SU-2015:1885-2
Security update for apache2

SUSE-SU-2015:1885-1
Security update for apache2
GHSA-892q-vvcr-v6j5
The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
ELSA-2015-1668
ELSA-2015-1668: httpd security update (MODERATE)

BDU:2015-10928
Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю передавать скрытые http-запросы
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2015-1667 ELSA-2015-1667: httpd security update (MODERATE) | около 10 лет назад | |||
![]() | SUSE-SU-2015:1851-1 Security update for apache2 | почти 10 лет назад | ||
ELSA-2015-1666 ELSA-2015-1666: httpd24-httpd security update (MODERATE) | больше 9 лет назад | |||
![]() | CVE-2015-3185 The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. | CVSS2: 4.3 | 7% Низкий | около 10 лет назад |
![]() | CVE-2015-3185 The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. | CVSS3: 3.7 | 7% Низкий | около 10 лет назад |
![]() | CVE-2015-3185 The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. | CVSS2: 4.3 | 7% Низкий | около 10 лет назад |
CVE-2015-3185 The ap_some_auth_required function in server/request.c in the Apache H ... | CVSS2: 4.3 | 7% Низкий | около 10 лет назад | |
![]() | CVE-2015-3183 The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c. | CVSS2: 5 | 39% Средний | около 10 лет назад |
![]() | CVE-2015-3183 The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c. | CVSS3: 3.7 | 39% Средний | около 10 лет назад |
![]() | CVE-2015-3183 The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c. | CVSS2: 5 | 39% Средний | около 10 лет назад |
CVE-2015-3183 The chunked transfer coding implementation in the Apache HTTP Server b ... | CVSS2: 5 | 39% Средний | около 10 лет назад | |
GHSA-5fv4-m5x3-j32p The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. | 7% Низкий | больше 3 лет назад | ||
![]() | BDU:2015-10929 Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю обойти существующие ограничения доступа | CVSS2: 4.3 | 7% Низкий | около 10 лет назад |
![]() | SUSE-SU-2015:1885-2 Security update for apache2 | 39% Средний | почти 10 лет назад | |
![]() | SUSE-SU-2015:1885-1 Security update for apache2 | 39% Средний | почти 10 лет назад | |
GHSA-892q-vvcr-v6j5 The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c. | 39% Средний | больше 3 лет назад | ||
ELSA-2015-1668 ELSA-2015-1668: httpd security update (MODERATE) | около 10 лет назад | |||
![]() | BDU:2015-10928 Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю передавать скрытые http-запросы | CVSS2: 5 | 39% Средний | около 10 лет назад |
Уязвимостей на страницу