Search CVE reports
1 – 10 of 42245 results
Connect2id Nimbus JOSE + JWT before 10.0.2 allows a remote attacker to cause a denial of service via a deeply nested JSON object supplied in a JWT claim set, because of uncontrolled recursion. NOTE: this is independent of the Gson...
1 affected package
libgoogle-gson-java
Package | 16.04 LTS |
---|---|
libgoogle-gson-java | Needs evaluation |
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue.
1 affected package
apache2
Package | 16.04 LTS |
---|---|
apache2 | Needs evaluation |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Tomcat when using the APR/Native connector. This was particularly noticeable with client initiated closes...
2 affected packages
apr, tomcat9
Package | 16.04 LTS |
---|---|
apr | Needs evaluation |
tomcat9 | — |
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using...
1 affected package
apache2
Package | 16.04 LTS |
---|---|
apache2 | Needs evaluation |
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a...
1 affected package
apache2
Package | 16.04 LTS |
---|---|
apache2 | Needs evaluation |
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for...
1 affected package
apache2
Package | 16.04 LTS |
---|---|
apache2 | Needs evaluation |
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where...
1 affected package
apache2
Package | 16.04 LTS |
---|---|
apache2 | Needs evaluation |
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache...
1 affected package
apache2
Package | 16.04 LTS |
---|---|
apache2 | Needs evaluation |
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify...
1 affected package
apache2
Package | 16.04 LTS |
---|---|
apache2 | Needs evaluation |
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was...
1 affected package
apache2
Package | 16.04 LTS |
---|---|
apache2 | Needs evaluation |