Логотип exploitDog
bind:"CVE-2024-47252" OR bind:"CVE-2025-23048" OR bind:"CVE-2025-49630" OR bind:"CVE-2025-49812"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-47252" OR bind:"CVE-2025-23048" OR bind:"CVE-2025-49630" OR bind:"CVE-2025-49812"

Количество 46

Количество 46

ubuntu логотип

CVE-2025-23048

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
EPSS: Низкий
redhat логотип

CVE-2025-23048

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-23048

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
EPSS: Низкий
msrc логотип

CVE-2025-23048

5 месяцев назад

Apache HTTP Server: mod_ssl access control bypass with session resumption

CVSS3: 9.1
EPSS: Низкий
debian логотип

CVE-2025-23048

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to ...

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-gh64-76r6-qhpc

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
EPSS: Низкий
fstec логотип

BDU:2025-08976

около 1 года назад

Уязвимость функции mod_ssl веб-сервера Apache HTTP Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 9.1
EPSS: Низкий
redos логотип

ROS-20250724-11

5 месяцев назад

Уязвимость httpd

CVSS3: 9.1
EPSS: Низкий
ubuntu логотип

CVE-2025-49630

5 месяцев назад

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-49630

5 месяцев назад

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-49630

5 месяцев назад

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-49630

5 месяцев назад

Apache HTTP Server: mod_proxy_http2 denial of service

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-49630

5 месяцев назад

In certain proxy configurations, a denial of service attack againstApa ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-49812

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2025-49812

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-49812

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

CVSS3: 7.4
EPSS: Низкий
msrc логотип

CVE-2025-49812

5 месяцев назад

Apache HTTP Server: mod_ssl TLS upgrade attack

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2025-49812

5 месяцев назад

In some mod_ssl configurations on Apache HTTP Server versions through ...

CVSS3: 7.4
EPSS: Низкий
rocky логотип

RLSA-2025:14983

2 месяца назад

Moderate: mod_http2 security update

EPSS: Низкий
rocky логотип

RLSA-2025:14625

3 месяца назад

Moderate: mod_http2 security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-23048

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-23048

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 7.5
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-23048

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-23048

Apache HTTP Server: mod_ssl access control bypass with session resumption

CVSS3: 9.1
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-23048

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to ...

CVSS3: 9.1
0%
Низкий
5 месяцев назад
github логотип
GHSA-gh64-76r6-qhpc

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVSS3: 9.1
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-08976

Уязвимость функции mod_ssl веб-сервера Apache HTTP Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 9.1
0%
Низкий
около 1 года назад
redos логотип
ROS-20250724-11

Уязвимость httpd

CVSS3: 9.1
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-49630

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

CVSS3: 7.5
1%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-49630

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

CVSS3: 7.5
1%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-49630

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

CVSS3: 7.5
1%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-49630

Apache HTTP Server: mod_proxy_http2 denial of service

CVSS3: 7.5
1%
Низкий
5 месяцев назад
debian логотип
CVE-2025-49630

In certain proxy configurations, a denial of service attack againstApa ...

CVSS3: 7.5
1%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-49812

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

CVSS3: 7.4
0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-49812

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

CVSS3: 7.5
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-49812

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

CVSS3: 7.4
0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-49812

Apache HTTP Server: mod_ssl TLS upgrade attack

CVSS3: 7.4
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-49812

In some mod_ssl configurations on Apache HTTP Server versions through ...

CVSS3: 7.4
0%
Низкий
5 месяцев назад
rocky логотип
RLSA-2025:14983

Moderate: mod_http2 security update

1%
Низкий
2 месяца назад
rocky логотип
RLSA-2025:14625

Moderate: mod_http2 security update

1%
Низкий
3 месяца назад

Уязвимостей на страницу