VYPR

rpm package

suse/apache2&distro=SUSE Manager Retail Branch Server 4.0

pkg:rpm/suse/apache2&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.0

Vulnerabilities (6)

  • CVE-2021-31618Jun 15, 2021
    affected < 2.4.33-3.50.1fixed 2.4.33-3.50.1

    Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status

  • CVE-2021-30641Jun 10, 2021
    affected < 2.4.33-3.50.1fixed 2.4.33-3.50.1

    Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'

  • CVE-2021-26691Jun 10, 2021
    affected < 2.4.33-3.50.1fixed 2.4.33-3.50.1

    In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow

  • CVE-2021-26690Jun 10, 2021
    affected < 2.4.33-3.50.1fixed 2.4.33-3.50.1

    Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service

  • CVE-2020-35452Jun 10, 2021
    affected < 2.4.33-3.50.1fixed 2.4.33-3.50.1

    Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation

  • CVE-2019-10092Sep 26, 2019
    affected < 2.4.33-3.50.1fixed 2.4.33-3.50.1

    In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server