Kaspersky ID:
KLA70199
Date de la détection:
07/01/2024
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Apache HTTP Server. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Security vulnerability in SSRF can be exploited to bypass security restrictions.
  2. Security vulnerability in mod_proxy can be exploited to bypass security restrictions.
  3. Remote code execution vulnerability in mod_rewrite can be exploited to execute scripts in directories permitted
  4. Denial of service vulnerability can be exploited remotely to cause denial of service.
  5. Remote code execution vulnerability in mod_rewrite can be exploited remotely to execute arbitrary code.
  6. Security vulnerability in mod_rewrite can be exploited to bypass security restrictions.
  7. Denial of service vulnerability in mod_proxy can be exploited remotely to cause denial of service.
  8. Security vulnerability in core of Apache HTTP Server can be exploited to bypass security restrictions.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2024-38472
    critical
  • CVE-2024-38473
    critical
  • CVE-2024-38474
    critical
  • CVE-2024-36387
    high
  • CVE-2024-38475
    critical
  • CVE-2024-39573
    critical
  • CVE-2024-38477
    critical
  • CVE-2024-38476
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.