説明
Multiple vulnerabilities were found in Apache HTTP Server. Malicious users can exploit these vulnerabilities to cause denial of service, obtain sensitive information, bypass security restrictions, execute arbitrary code, inject malicious code, gain privileges.
Below is a complete list of vulnerabilities:
- Buffer Over-read vulnerability in Apache HTTP Server can be exploited to cause denial of service.
- Throttling vulnerability in mod_md can be exploited to cause denial of service.
- Out-of-bounds Read vulnerability in mod_proxy_ajp can be exploited to obtain sensitive information
- A timing attack against mod_auth_digest can be exploited to bypass security restrictions
- Double Free and RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol can be exploited remotely to execute arbitrary code
- Improper Null Termination, Out-of-bounds Read vulnerability can be exploited to obtain sensitive information
- HTTP response splitting vulnerability can be exploited to inject content into http response
- An escalation of privilege vulnerability can be exploited remotely to escalate privileges and obtain sensitive information
- A NULL pointer dereference vulnerability in the mod_authn_socache can be exploited to cause denial of service
- Heap-based Buffer Overflow vulnerability in mod_proxy_ajp can be exploited remotely to execute arbitrary code and cause denial of service
- A NULL pointer dereference in mod_dav_lock can be exploited to cause denial of service
オリジナルアドバイザリー
エクスプロイテーション
Public exploits exist for this vulnerability.
CVEリスト
- CVE-2026-24072 critical
- CVE-2026-34059 critical
- CVE-2026-33857 high
- CVE-2026-34032 high
- CVE-2026-23918 critical
- CVE-2026-29169 critical
- CVE-2026-33006 warning
- CVE-2026-33007 high
- CVE-2026-33523 high
- CVE-2026-29168 high
- CVE-2026-28780 unknown
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!