Количество 37
Количество 37
RLSA-2021:1809
Moderate: httpd:2.4 security, bug fix, and enhancement update
ELSA-2021-1809
ELSA-2021-1809: httpd:2.4 security, bug fix, and enhancement update (MODERATE)
openSUSE-SU-2020:1293-1
Security update for apache2
openSUSE-SU-2020:1285-1
Security update for apache2
SUSE-SU-2020:2344-1
Security update for apache2
SUSE-SU-2020:2311-1
Security update for apache2
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns logging statements were made on the wrong connection causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
CVE-2020-11993
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enab ...
GHSA-89mq-r3q6-9q3q
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
BDU:2021-00779
Уязвимость реализации механизма HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или привести к неверной конфигурации сервера
openSUSE-SU-2020:1792-1
Security update for apache2
SUSE-SU-2020:3067-1
Security update for apache2
CVE-2020-11984
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CVE-2020-11984
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CVE-2020-11984
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CVE-2020-11984
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CVE-2020-11984
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure an ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2021:1809 Moderate: httpd:2.4 security, bug fix, and enhancement update | больше 4 лет назад | |||
ELSA-2021-1809 ELSA-2021-1809: httpd:2.4 security, bug fix, and enhancement update (MODERATE) | больше 4 лет назад | |||
openSUSE-SU-2020:1293-1 Security update for apache2 | больше 5 лет назад | |||
openSUSE-SU-2020:1285-1 Security update for apache2 | больше 5 лет назад | |||
SUSE-SU-2020:2344-1 Security update for apache2 | больше 5 лет назад | |||
SUSE-SU-2020:2311-1 Security update for apache2 | больше 5 лет назад | |||
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns logging statements were made on the wrong connection causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
CVE-2020-11993 Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enab ... | CVSS3: 7.5 | 39% Средний | больше 5 лет назад | |
GHSA-89mq-r3q6-9q3q Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | CVSS3: 7.5 | 39% Средний | больше 3 лет назад | |
BDU:2021-00779 Уязвимость реализации механизма HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или привести к неверной конфигурации сервера | CVSS3: 7.3 | 39% Средний | больше 5 лет назад | |
openSUSE-SU-2020:1792-1 Security update for apache2 | больше 5 лет назад | |||
SUSE-SU-2020:3067-1 Security update for apache2 | больше 5 лет назад | |||
CVE-2020-11984 Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE | CVSS3: 9.8 | 75% Высокий | больше 5 лет назад | |
CVE-2020-11984 Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE | CVSS3: 9.8 | 75% Высокий | больше 5 лет назад | |
CVE-2020-11984 Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE | CVSS3: 9.8 | 75% Высокий | больше 5 лет назад | |
CVE-2020-11984 Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE | CVSS3: 9.8 | 75% Высокий | больше 5 лет назад | |
CVE-2020-11984 Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure an ... | CVSS3: 9.8 | 75% Высокий | больше 5 лет назад |
Уязвимостей на страницу