Количество 51
Количество 51

openSUSE-SU-2022:0091-1
Security update for apache2

SUSE-SU-2022:0440-1
Security update for apache2

SUSE-SU-2022:0119-1
Security update for apache2

SUSE-SU-2022:0091-2
Security update for apache2

SUSE-SU-2022:0091-1
Security update for apache2

SUSE-SU-2022:0065-1
Security update for apache2

ROS-20211223-04
Множественные уязвимости HTTP-сервера Apache

CVE-2021-33193
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

CVE-2021-33193
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

CVE-2021-33193
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
CVE-2021-33193
A crafted method sent through HTTP/2 will bypass validation and be for ...

CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow

CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow

CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow

CVE-2020-35452
CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest ...

openSUSE-SU-2021:2954-1
Security update for apache2

openSUSE-SU-2021:1234-1
Security update for apache2

SUSE-SU-2021:2954-1
Security update for apache2

SUSE-SU-2021:2918-1
Security update for apache2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | openSUSE-SU-2022:0091-1 Security update for apache2 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0440-1 Security update for apache2 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0119-1 Security update for apache2 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0091-2 Security update for apache2 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0091-1 Security update for apache2 | больше 3 лет назад | ||
![]() | SUSE-SU-2022:0065-1 Security update for apache2 | больше 3 лет назад | ||
![]() | ROS-20211223-04 Множественные уязвимости HTTP-сервера Apache | больше 3 лет назад | ||
![]() | CVE-2021-33193 A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. | CVSS3: 7.5 | 1% Низкий | почти 4 года назад |
![]() | CVE-2021-33193 A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. | CVSS3: 7.5 | 1% Низкий | почти 4 года назад |
![]() | CVE-2021-33193 A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. | CVSS3: 7.5 | 1% Низкий | почти 4 года назад |
CVE-2021-33193 A crafted method sent through HTTP/2 will bypass validation and be for ... | CVSS3: 7.5 | 1% Низкий | почти 4 года назад | |
![]() | CVE-2020-35452 Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow | CVSS3: 7.3 | 7% Низкий | около 4 лет назад |
![]() | CVE-2020-35452 Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow | CVSS3: 7.3 | 7% Низкий | около 4 лет назад |
![]() | CVE-2020-35452 Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow | CVSS3: 7.3 | 7% Низкий | около 4 лет назад |
![]() | CVSS3: 7.3 | 7% Низкий | около 4 лет назад | |
CVE-2020-35452 Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest ... | CVSS3: 7.3 | 7% Низкий | около 4 лет назад | |
![]() | openSUSE-SU-2021:2954-1 Security update for apache2 | 1% Низкий | почти 4 года назад | |
![]() | openSUSE-SU-2021:1234-1 Security update for apache2 | 1% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:2954-1 Security update for apache2 | 1% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:2918-1 Security update for apache2 | 1% Низкий | почти 4 года назад |
Уязвимостей на страницу