Количество 23
Количество 23
ELSA-2024-9306
ELSA-2024-9306: httpd security update (MODERATE)

SUSE-SU-2024:1963-1
Security update for apache2

SUSE-SU-2024:1868-1
Security update for apache2

SUSE-SU-2024:1788-1
Security update for apache2

SUSE-SU-2024:1627-1
Security update for apache2

ROS-20240726-05
Множественные уязвимости httpd

CVE-2023-38709
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.

CVE-2023-38709
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.

CVE-2023-38709
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.

CVE-2023-38709
CVE-2023-38709
Faulty input validation in the core of Apache allows malicious or expl ...

CVE-2024-24795
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.

CVE-2024-24795
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.

CVE-2024-24795
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.

CVE-2024-24795
CVE-2024-24795
HTTP Response splitting in multiple modules in Apache HTTP Server allo ...
GHSA-9fvf-9v35-97qv
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
ELSA-2024-4197
ELSA-2024-4197: httpd:2.4/httpd security update (MODERATE)

BDU:2024-03101
Уязвимость веб-сервера Apache HTTP Server, связанная с непринятием мер по обработке последовательностей CRLF в HTTP-заголовках, позволяющая нарушителю выполнять атаки с разделением ответов HTTP

SUSE-SU-2024:3861-1
Security update for uwsgi
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2024-9306 ELSA-2024-9306: httpd security update (MODERATE) | 8 месяцев назад | |||
![]() | SUSE-SU-2024:1963-1 Security update for apache2 | около 1 года назад | ||
![]() | SUSE-SU-2024:1868-1 Security update for apache2 | около 1 года назад | ||
![]() | SUSE-SU-2024:1788-1 Security update for apache2 | около 1 года назад | ||
![]() | SUSE-SU-2024:1627-1 Security update for apache2 | около 1 года назад | ||
![]() | ROS-20240726-05 Множественные уязвимости httpd | CVSS3: 6.5 | 11 месяцев назад | |
![]() | CVE-2023-38709 Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. | CVSS3: 7.3 | 1% Низкий | около 1 года назад |
![]() | CVE-2023-38709 Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. | CVSS3: 6.8 | 1% Низкий | около 1 года назад |
![]() | CVE-2023-38709 Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. | CVSS3: 7.3 | 1% Низкий | около 1 года назад |
![]() | CVSS3: 7.3 | 1% Низкий | 8 месяцев назад | |
CVE-2023-38709 Faulty input validation in the core of Apache allows malicious or expl ... | CVSS3: 7.3 | 1% Низкий | около 1 года назад | |
![]() | CVE-2024-24795 HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue. | CVSS3: 6.3 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-24795 HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue. | CVSS3: 4 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-24795 HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue. | CVSS3: 6.3 | 0% Низкий | около 1 года назад |
![]() | CVSS3: 6.3 | 0% Низкий | 8 месяцев назад | |
CVE-2024-24795 HTTP Response splitting in multiple modules in Apache HTTP Server allo ... | CVSS3: 6.3 | 0% Низкий | около 1 года назад | |
GHSA-9fvf-9v35-97qv Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. | CVSS3: 7.3 | 1% Низкий | около 1 года назад | |
ELSA-2024-4197 ELSA-2024-4197: httpd:2.4/httpd security update (MODERATE) | 12 месяцев назад | |||
![]() | BDU:2024-03101 Уязвимость веб-сервера Apache HTTP Server, связанная с непринятием мер по обработке последовательностей CRLF в HTTP-заголовках, позволяющая нарушителю выполнять атаки с разделением ответов HTTP | CVSS3: 5.4 | 1% Низкий | около 2 лет назад |
![]() | SUSE-SU-2024:3861-1 Security update for uwsgi | 0% Низкий | 8 месяцев назад |
Уязвимостей на страницу