搜索结果
关于「http_server」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2026-28780 | Apache HTTP Server mod_proxy_ajp堆缓冲区溢出(CVE-2026-28780) | 2026-05-06 | ||
| AVD-2026-29168 | Apache HTTP 服务器:mod_md 无限制 OCSP 响应 (CVE-2026-29168) | 2026-05-05 | ||
| AVD-2026-33007 | Apache HTTP 服务器:mod_authn_socache 崩溃 (CVE-2026-33007) | 2026-05-04 | ||
| AVD-2026-33523 | Apache HTTP Server:多个模块:HTTP 响应分割转发恶意状态行 (CVE-2026-33523) | 2026-05-04 | ||
| AVD-2026-23918 | Apache HTTP 服务器:http2:早期重置时双重释放和可能的 RCE (CVE-2026-23918) | 2026-05-04 | ||
| AVD-2026-29169 | Apache HTTP 服务器:mod_dav_lock 间接锁定崩溃 (CVE-2026-29169) | 2026-05-04 | ||
| AVD-2026-33006 | Apache HTTP 服务器:mod_auth_digest 定时攻击 (CVE-2026-33006) | 2026-05-04 | ||
| AVD-2026-33857 | Apache HTTP 服务器:AJP getter 函数中的 OOB 读取相差一 (CVE-2026-33857) | 2026-05-04 | ||
| AVD-2026-34032 | Apache HTTP 服务器:mod_proxy_ajp:由于缺少空终止检查而导致堆缓冲区过度读取 (ajp_msg_get_string) (CVE-2026-34032) | 2026-05-04 | ||
| AVD-2026-34059 | Apache HTTP 服务器:mod_proxy_ajp:ajp_parse_data() 中的堆过度读取和内存泄露 (CVE-2026-34059) | 2026-05-04 | ||
| AVD-2026-24072 | Apache HTTP 服务器:mod_rewrite 通过 ap_expr 进行权限提升 (CVE-2026-24072) | 2026-05-04 | ||
| AVD-2026-34291 | Oracle HTTP Server访问控制漏洞(CVE-2026-34291) | 2026-04-22 | ||
| AVD-2026-21962 | Oracle Fusion Middleware 安全漏洞(CVE-2026-21962) | 2026-01-21 | ||
| AVD-2025-58098 | Apache HTTP 服务器:服务器端包含将查询字符串添加到 #exec cmd=... (CVE-2025-58098) | 2025-12-05 | ||
| AVD-2025-66200 | Apache HTTP 服务器:mod_userdir+suexec 通过 AllowOverride FileInfo 绕过 (CVE-2025-66200) | 2025-12-05 | ||
| AVD-2025-59775 | Apache HTTP 服务器:Windows 上的 NTLM 通过 UNC SSRF 泄露 (CVE-2025-59775) | 2025-12-05 | ||
| AVD-2025-65082 | Apache HTTP 服务器:CGI 环境变量覆盖 (CVE-2025-65082) | 2025-12-05 | ||
| AVD-2025-55753 | Apache HTTP 服务器:mod_md (ACME)、意外重试间隔 (CVE-2025-55753) | 2025-12-05 | ||
| AVD-2025-54090 | Apache HTTP服务器:“ RewriteCond Expr”始终在2.4.64中评估为true(CVE-2025-54090) | 2025-07-23 | ||
| AVD-2024-43204 | Apache HTTP服务器:带有MOD_HEADERS设置内容类型标头的SSRF(CVE-2024-43204) | 2025-07-11 | ||
| AVD-2025-49630 | Apache HTTP服务器:MOD_PROXY_HTTP2拒绝服务(CVE-2025-49630) | 2025-07-11 | ||
| AVD-2025-53020 | Apache HTTP服务器:HTTP/2 DOS通过内存增加(CVE-2025-53020) | 2025-07-11 | ||
| AVD-2025-49812 | Apache HTTP服务器:MOD_SSL TLS升级攻击(CVE-2025-49812) | 2025-07-11 | ||
| AVD-2024-43394 | Apache HTTP服务器:由于UNC路径(CVE-2024-43394),Windows上的SSRF | 2025-07-11 | ||
| AVD-2024-42516 | Apache HTTP服务器:HTTP响应拆分(CVE-2024-42516) | 2025-07-11 | ||
| AVD-2024-47252 | Apache HTTP服务器:MOD_SSL错误日志变量逃脱(CVE-2024-47252) | 2025-07-11 | ||
| AVD-2025-23048 | Apache HTTP服务器:MOD_SSL访问控制旁路,并恢复会话(CVE-2025-23048) | 2025-07-11 | ||
| AVD-2025-3891 | MOD_AUTH_OPENIDC:DOS通过MOD_AUTH_OPENIDC中的空帖子启用了OIDCPRESERVEPOST(CVE-2025-3891) | 2025-04-29 | ||
| AVD-2025-21498 | N/A | 2025-01-22 | ||
| AVD-2024-40898 | Apache HTTP Server on Windows SSRF漏洞(CVE-2024-40898) | 2024-07-18 |