Kaspersky ID:
KLA12554
Erkennungsdatum:
06/08/2022
Aktualisiert:
03/02/2026

Beschreibung

Multiple vulnerabilities were found in Apache HTTP Server. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Out of bounds read vulnerability in ap_rwrite can be exploited to cause denial of service.
  2. HTTP request smuggling vulnerability in mod_proxy_ajp can be exploited to bypass security restrictions.
  3. Security vulnerability in mod_proxy can be exploited to bypass security restrictions.
  4. Out of bounds read vulnerability in mod_isapi can be exploited to cause denial of service.
  5. Information disclosure vulnerability in mod_lua can be exploited to obtain sensitive information.
  6. Denial of service vulnerability in mod_sed can be exploited to cause denial of service.
  7. Out of bounds read vulnerability in ap_strcmp_match can be exploited to cause denial of service.
  8. Denial of service vulnerability in mod_lua r:parsebody can be exploited to cause denial of service.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Betroffene Produkte

CVE Liste

  • CVE-2022-28614
    high
  • CVE-2022-26377
    critical
  • CVE-2022-31813
    critical
  • CVE-2022-28330
    high
  • CVE-2022-30556
    critical
  • CVE-2022-30522
    critical
  • CVE-2022-28615
    critical
  • CVE-2022-29404
    critical

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.