Количество 29
Количество 29
openSUSE-SU-2017:0903-1
Security update for apache2
openSUSE-SU-2017:0897-1
Security update for apache2
SUSE-SU-2017:0801-1
Security update for apache2
SUSE-SU-2017:0797-1
Security update for apache2
ELSA-2017-0906
ELSA-2017-0906: httpd security and bug fix update (MODERATE)
SUSE-SU-2017:0729-1
Security update for apache2
CVE-2016-8743
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
CVE-2016-8743
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
CVE-2016-8743
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
CVE-2016-8743
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was li ...
GHSA-2rfh-2gh8-v9fq
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
ELSA-2017-1721
ELSA-2017-1721: httpd security and bug fix update (MODERATE)
BDU:2017-01804
Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю провести сетевые атаки
openSUSE-SU-2018:2856-1
Security update for apache2
SUSE-SU-2018:2815-2
Security update for apache2
SUSE-SU-2018:2815-1
Security update for apache2
SUSE-SU-2018:2554-1
Security update for apache2
CVE-2016-0736
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
CVE-2016-0736
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
CVE-2016-0736
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
openSUSE-SU-2017:0903-1 Security update for apache2 | больше 8 лет назад | |||
openSUSE-SU-2017:0897-1 Security update for apache2 | больше 8 лет назад | |||
SUSE-SU-2017:0801-1 Security update for apache2 | больше 8 лет назад | |||
SUSE-SU-2017:0797-1 Security update for apache2 | больше 8 лет назад | |||
ELSA-2017-0906 ELSA-2017-0906: httpd security and bug fix update (MODERATE) | больше 8 лет назад | |||
SUSE-SU-2017:0729-1 Security update for apache2 | больше 8 лет назад | |||
CVE-2016-8743 Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. | CVSS3: 7.5 | 8% Низкий | больше 8 лет назад | |
CVE-2016-8743 Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. | CVSS3: 4 | 8% Низкий | почти 9 лет назад | |
CVE-2016-8743 Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. | CVSS3: 7.5 | 8% Низкий | больше 8 лет назад | |
CVE-2016-8743 Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was li ... | CVSS3: 7.5 | 8% Низкий | больше 8 лет назад | |
GHSA-2rfh-2gh8-v9fq Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. | CVSS3: 7.5 | 8% Низкий | больше 3 лет назад | |
ELSA-2017-1721 ELSA-2017-1721: httpd security and bug fix update (MODERATE) | больше 8 лет назад | |||
BDU:2017-01804 Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю провести сетевые атаки | CVSS2: 5 | 8% Низкий | больше 8 лет назад | |
openSUSE-SU-2018:2856-1 Security update for apache2 | около 7 лет назад | |||
SUSE-SU-2018:2815-2 Security update for apache2 | около 7 лет назад | |||
SUSE-SU-2018:2815-1 Security update for apache2 | около 7 лет назад | |||
SUSE-SU-2018:2554-1 Security update for apache2 | около 7 лет назад | |||
CVE-2016-0736 In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. | CVSS3: 7.5 | 32% Средний | больше 8 лет назад | |
CVE-2016-0736 In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. | CVSS3: 5.4 | 32% Средний | почти 9 лет назад | |
CVE-2016-0736 In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. | CVSS3: 7.5 | 32% Средний | больше 8 лет назад |
Уязвимостей на страницу