Количество 25
Количество 25
RLSA-2024:9306
Moderate: httpd security update
ELSA-2024-9306
ELSA-2024-9306: httpd security update (MODERATE)
SUSE-SU-2024:1963-1
Security update for apache2
SUSE-SU-2024:1868-1
Security update for apache2
SUSE-SU-2024:1788-1
Security update for apache2
SUSE-SU-2024:1627-1
Security update for apache2
ROS-20240726-05
Множественные уязвимости httpd
CVE-2024-24795
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
CVE-2024-24795
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
CVE-2024-24795
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
CVE-2024-24795
CVE-2024-24795
HTTP Response splitting in multiple modules in Apache HTTP Server allo ...
CVE-2023-38709
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
CVE-2023-38709
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
CVE-2023-38709
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
CVE-2023-38709
CVE-2023-38709
Faulty input validation in the core of Apache allows malicious or expl ...
SUSE-SU-2024:3861-1
Security update for uwsgi
SUSE-SU-2024:3853-1
Security update for uwsgi
RLSA-2024:4197
Moderate: httpd:2.4/httpd security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2024:9306 Moderate: httpd security update | 10 месяцев назад | |||
ELSA-2024-9306 ELSA-2024-9306: httpd security update (MODERATE) | около 1 года назад | |||
SUSE-SU-2024:1963-1 Security update for apache2 | больше 1 года назад | |||
SUSE-SU-2024:1868-1 Security update for apache2 | больше 1 года назад | |||
SUSE-SU-2024:1788-1 Security update for apache2 | больше 1 года назад | |||
SUSE-SU-2024:1627-1 Security update for apache2 | больше 1 года назад | |||
ROS-20240726-05 Множественные уязвимости httpd | CVSS3: 6.5 | больше 1 года назад | ||
CVE-2024-24795 HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue. | CVSS3: 6.3 | 1% Низкий | почти 2 года назад | |
CVE-2024-24795 HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue. | CVSS3: 4 | 1% Низкий | почти 2 года назад | |
CVE-2024-24795 HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue. | CVSS3: 6.3 | 1% Низкий | почти 2 года назад | |
CVSS3: 6.3 | 1% Низкий | около 1 года назад | ||
CVE-2024-24795 HTTP Response splitting in multiple modules in Apache HTTP Server allo ... | CVSS3: 6.3 | 1% Низкий | почти 2 года назад | |
CVE-2023-38709 Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. | CVSS3: 7.3 | 3% Низкий | почти 2 года назад | |
CVE-2023-38709 Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. | CVSS3: 6.8 | 3% Низкий | почти 2 года назад | |
CVE-2023-38709 Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. | CVSS3: 7.3 | 3% Низкий | почти 2 года назад | |
CVSS3: 7.3 | 3% Низкий | около 1 года назад | ||
CVE-2023-38709 Faulty input validation in the core of Apache allows malicious or expl ... | CVSS3: 7.3 | 3% Низкий | почти 2 года назад | |
SUSE-SU-2024:3861-1 Security update for uwsgi | 1% Низкий | около 1 года назад | ||
SUSE-SU-2024:3853-1 Security update for uwsgi | 1% Низкий | около 1 года назад | ||
RLSA-2024:4197 Moderate: httpd:2.4/httpd security update | 3% Низкий | больше 1 года назад |
Уязвимостей на страницу