Search CVE reports
2391 – 2400 of 45001 results
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a...
1 affected package
apache2
| Package | 16.04 LTS |
|---|---|
| apache2 | Not affected |
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for...
1 affected package
apache2
| Package | 16.04 LTS |
|---|---|
| apache2 | Fixed |
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where...
1 affected package
apache2
| Package | 16.04 LTS |
|---|---|
| apache2 | Fixed |
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache...
1 affected package
apache2
| Package | 16.04 LTS |
|---|---|
| apache2 | Not affected |
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify...
1 affected package
apache2
| Package | 16.04 LTS |
|---|---|
| apache2 | Fixed |
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was...
1 affected package
apache2
| Package | 16.04 LTS |
|---|---|
| apache2 | Fixed |
A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Not affected |
A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents...
2 affected packages
libxslt, libxml2
| Package | 16.04 LTS |
|---|---|
| libxslt | Vulnerable |
| libxml2 | Needs evaluation |
A flaw was found in the libxslt library. The same memory field, psvi, is used for both stylesheet and input data, which can lead to type confusion during XML transformations. This vulnerability allows an attacker to crash the...
1 affected package
libxslt
| Package | 16.04 LTS |
|---|---|
| libxslt | Vulnerable |
A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause...
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Fixed |