Mailing List Archive

(httpd-site) branch asf-site updated: Automatic Site Publish by Buildbot
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/httpd-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
new 315352f Automatic Site Publish by Buildbot
315352f is described below

commit 315352fe3407e3e4b458b14788656d6806f441f7
Author: buildbot <users@infra.apache.org>
AuthorDate: Thu Apr 4 13:53:07 2024 +0000

Automatic Site Publish by Buildbot
---
output/ABOUT_APACHE.html | 2 +-
output/apreq/download.html | 2 +-
output/apreq/index.html | 2 +-
output/bug_report.html | 2 +-
output/contribute/index.html | 2 +-
output/contributors/index.html | 2 +-
output/dev/debugging.html | 2 +-
output/dev/devnotes.html | 2 +-
output/dev/guidelines.html | 2 +-
output/dev/index.html | 2 +-
output/dev/patches.html | 2 +-
output/dev/release.html | 2 +-
output/dev/styleguide.html | 2 +-
output/dev/verification.html | 2 +-
output/doap.rdf | 4 +-
output/docs-project/avail_translations.html | 2 +-
output/docs-project/contribute.html | 2 +-
output/docs-project/contributors.html | 2 +-
output/docs-project/docsformat.html | 2 +-
output/docs-project/goingfurther.html | 2 +-
output/docs-project/index.html | 2 +-
output/docs-project/svn.html | 2 +-
output/docs-project/translations.html | 2 +-
output/docs/index.html | 2 +-
output/download.html | 26 +-
output/index.html | 10 +-
output/info/index.html | 2 +-
output/lists.html | 2 +-
output/mod_fcgid/index.html | 2 +-
output/mod_ftp/index.html | 2 +-
output/mod_mbox/index.html | 2 +-
output/mod_mbox/install.html | 2 +-
output/mod_mbox/ref.html | 2 +-
output/mod_smtpd/index.html | 2 +-
output/mod_smtpd/install.html | 2 +-
output/modules/index.html | 2 +-
output/security/impact_levels.html | 2 +-
output/security/json/CVE-2023-38709.json | 101 +++
output/security/json/CVE-2024-24795.json | 96 +++
output/security/json/CVE-2024-27316.json | 93 +++
output/security/vulnerabilities-httpd.json | 290 +++++++
output/security/vulnerabilities_13.html | 2 +-
output/security/vulnerabilities_20.html | 2 +-
output/security/vulnerabilities_22.html | 2 +-
output/security/vulnerabilities_24.html | 1145 ---------------------------
output/security_report.html | 2 +-
output/support.html | 2 +-
output/test/flood/building.html | 2 +-
output/test/flood/faq.html | 2 +-
output/test/flood/index.html | 2 +-
output/test/index.html | 2 +-
output/usersdelist.html | 2 +-
output/userslist.html | 2 +-
53 files changed, 645 insertions(+), 1210 deletions(-)

diff --git a/output/ABOUT_APACHE.html b/output/ABOUT_APACHE.html
index 2958d21..cb366aa 100644
--- a/output/ABOUT_APACHE.html
+++ b/output/ABOUT_APACHE.html
@@ -260,7 +260,7 @@ marks.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/apreq/download.html b/output/apreq/download.html
index ec84041..84c07c8 100644
--- a/output/apreq/download.html
+++ b/output/apreq/download.html
@@ -137,7 +137,7 @@ users can get binary md5 programs from <a href="http://www.fourmilab.ch/md5/">he

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/apreq/index.html b/output/apreq/index.html
index b47fa9a..3b7755f 100644
--- a/output/apreq/index.html
+++ b/output/apreq/index.html
@@ -166,7 +166,7 @@ and <a href="http://svn.apache.org/viewcvs.cgi/httpd/apreq/trunk/">httpd-apreq-2

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/bug_report.html b/output/bug_report.html
index 17fb6ef..d1beb2c 100644
--- a/output/bug_report.html
+++ b/output/bug_report.html
@@ -144,7 +144,7 @@ Bugzilla project for Apache HTTPD is "Apache httpd-2".</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/contribute/index.html b/output/contribute/index.html
index 81c259c..94a9c81 100644
--- a/output/contribute/index.html
+++ b/output/contribute/index.html
@@ -115,7 +115,7 @@ mailing list.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/contributors/index.html b/output/contributors/index.html
index 18d2067..3d789ae 100644
--- a/output/contributors/index.html
+++ b/output/contributors/index.html
@@ -994,7 +994,7 @@ Graduate Student<br/> <strong>Location:</strong> Charlottesville, VA<br/>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/dev/debugging.html b/output/dev/debugging.html
index f40b975..de7eefc 100644
--- a/output/dev/debugging.html
+++ b/output/dev/debugging.html
@@ -505,7 +505,7 @@ file analysis tool.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/dev/devnotes.html b/output/dev/devnotes.html
index 0c1dac0..e06327d 100644
--- a/output/dev/devnotes.html
+++ b/output/dev/devnotes.html
@@ -219,7 +219,7 @@ keyword as part of the commit message.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/dev/guidelines.html b/output/dev/guidelines.html
index 15b8446..f0fb05f 100644
--- a/output/dev/guidelines.html
+++ b/output/dev/guidelines.html
@@ -470,7 +470,7 @@ overridden.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/dev/index.html b/output/dev/index.html
index 84cf07b..1494fbf 100644
--- a/output/dev/index.html
+++ b/output/dev/index.html
@@ -167,7 +167,7 @@ API</li>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/dev/patches.html b/output/dev/patches.html
index 2f4ad0d..653b18a 100644
--- a/output/dev/patches.html
+++ b/output/dev/patches.html
@@ -242,7 +242,7 @@ the droppings.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/dev/release.html b/output/dev/release.html
index da5d51f..9b90495 100644
--- a/output/dev/release.html
+++ b/output/dev/release.html
@@ -443,7 +443,7 @@ you found this document useful.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/dev/styleguide.html b/output/dev/styleguide.html
index 50fef48..483395b 100644
--- a/output/dev/styleguide.html
+++ b/output/dev/styleguide.html
@@ -238,7 +238,7 @@ a = !b

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/dev/verification.html b/output/dev/verification.html
index 632387f..9f0aba7 100644
--- a/output/dev/verification.html
+++ b/output/dev/verification.html
@@ -239,7 +239,7 @@ fa53c95631febb08a9de41fd2864cfff815cf62d9306723ab0d4b8d7aa1638f0 *httpd-2.4.34.t

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/doap.rdf b/output/doap.rdf
index abbd202..d477be0 100644
--- a/output/doap.rdf
+++ b/output/doap.rdf
@@ -38,8 +38,8 @@
<release>
<Version>
<name>Recommended current 2.4 release</name>
- <created>2023-10-19</created>
- <revision>2.4.58</revision>
+ <created>2024-04-04</created>
+ <revision>2.4.59</revision>
</Version>
</release>

diff --git a/output/docs-project/avail_translations.html b/output/docs-project/avail_translations.html
index dc693b5..9c447f3 100644
--- a/output/docs-project/avail_translations.html
+++ b/output/docs-project/avail_translations.html
@@ -1297,7 +1297,7 @@ us know. ( <a href="translations.html">Back to translations page</a> )</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/docs-project/contribute.html b/output/docs-project/contribute.html
index bd43f40..d25c58a 100644
--- a/output/docs-project/contribute.html
+++ b/output/docs-project/contribute.html
@@ -239,7 +239,7 @@ Server were contributed by</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/docs-project/contributors.html b/output/docs-project/contributors.html
index 6d8775b..a9dc304 100644
--- a/output/docs-project/contributors.html
+++ b/output/docs-project/contributors.html
@@ -201,7 +201,7 @@ Server were contributed by</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/docs-project/docsformat.html b/output/docs-project/docsformat.html
index 1510dde..51217b1 100644
--- a/output/docs-project/docsformat.html
+++ b/output/docs-project/docsformat.html
@@ -194,7 +194,7 @@ substitution table may be a better solution.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/docs-project/goingfurther.html b/output/docs-project/goingfurther.html
index 9c172d0..a84a00a 100644
--- a/output/docs-project/goingfurther.html
+++ b/output/docs-project/goingfurther.html
@@ -195,7 +195,7 @@ to generate HTML files from xml ones (see <a href="docsformat.html">this documen

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/docs-project/index.html b/output/docs-project/index.html
index 348a1a4..5e485ea 100644
--- a/output/docs-project/index.html
+++ b/output/docs-project/index.html
@@ -177,7 +177,7 @@ many people. We've listed them <a href="contributors.html">over here</a>.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/docs-project/svn.html b/output/docs-project/svn.html
index 00f0e61..822ab04 100644
--- a/output/docs-project/svn.html
+++ b/output/docs-project/svn.html
@@ -146,7 +146,7 @@ making. If it's in reference to a specific bug ticket, mention that, too.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/docs-project/translations.html b/output/docs-project/translations.html
index 0228319..123e07b 100644
--- a/output/docs-project/translations.html
+++ b/output/docs-project/translations.html
@@ -184,7 +184,7 @@ start.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/docs/index.html b/output/docs/index.html
index b2b2fc0..9192c41 100644
--- a/output/docs/index.html
+++ b/output/docs/index.html
@@ -114,7 +114,7 @@ help to improve the docs.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/download.html b/output/download.html
index 117b94c..17da3cf 100644
--- a/output/download.html
+++ b/output/download.html
@@ -100,33 +100,33 @@ families of releases, are available from the
<a href="//httpd.apache.org/docs/current/platform/windows.html#down">a number of third party vendors</a>.</p>
<p>Stable Release - Latest Version:</p>
<ul>
-<li><a href="#apache24">2.4.58</a> (released 2023-10-19)</li>
+<li><a href="#apache24">2.4.59</a> (released 2024-04-04)</li>
</ul>
<p>If you are downloading the Win32 distribution, please read these <a href="[preferred]httpd/binaries/win32/README.html">important
notes</a>.</p>
-<h1 id="apache24">Apache HTTP Server 2.4.58 (httpd): 2.4.58 is the latest available version <span>2023-10-19</span><a class="headerlink" href="#apache24" title="Permalink">&para;</a></h1>
+<h1 id="apache24">Apache HTTP Server 2.4.59 (httpd): 2.4.59 is the latest available version <span>2024-04-04</span><a class="headerlink" href="#apache24" title="Permalink">&para;</a></h1>
<p>The Apache HTTP Server Project is pleased to
<a href="//downloads.apache.org/httpd/Announcement2.4.txt">announce</a> the
-release of version 2.4.58 of the Apache HTTP Server ("Apache" and "httpd").
+release of version 2.4.59 of the Apache HTTP Server ("Apache" and "httpd").
This version of Apache is our latest GA release of the new generation 2.4.x
branch of Apache HTTPD and represents fifteen years of innovation by the
project, and is recommended over all previous releases!</p>
<p>For details, see the <a href="//downloads.apache.org/httpd/Announcement2.4.html">Official
Announcement</a> and
the <a href="[preferred]httpd/CHANGES_2.4">CHANGES_2.4</a> and
-<a href="[preferred]httpd/CHANGES_2.4.58">CHANGES_2.4.58</a> lists.</p>
+<a href="[preferred]httpd/CHANGES_2.4.59">CHANGES_2.4.59</a> lists.</p>
<ul>
<li>
-<p>Source: <a href="[preferred]httpd/httpd-2.4.58.tar.bz2">httpd-2.4.58.tar.bz2</a>
-[ <a href="https://downloads.apache.org/httpd/httpd-2.4.58.tar.bz2.asc">PGP</a> ] [
-<a href="https://downloads.apache.org/httpd/httpd-2.4.58.tar.bz2.sha256">SHA256</a> ] [
-<a href="https://downloads.apache.org/httpd/httpd-2.4.58.tar.bz2.sha512">SHA512</a> ]</p>
+<p>Source: <a href="[preferred]httpd/httpd-2.4.59.tar.bz2">httpd-2.4.59.tar.bz2</a>
+[ <a href="https://downloads.apache.org/httpd/httpd-2.4.59.tar.bz2.asc">PGP</a> ] [
+<a href="https://downloads.apache.org/httpd/httpd-2.4.59.tar.bz2.sha256">SHA256</a> ] [
+<a href="https://downloads.apache.org/httpd/httpd-2.4.59.tar.bz2.sha512">SHA512</a> ]</p>
</li>
<li>
-<p>Source: <a href="[preferred]httpd/httpd-2.4.58.tar.gz">httpd-2.4.58.tar.gz</a> [
-<a href="https://downloads.apache.org/httpd/httpd-2.4.58.tar.gz.asc">PGP</a> ] [
-<a href="https://downloads.apache.org/httpd/httpd-2.4.58.tar.gz.sha256">SHA256</a> ] [
-<a href="https://downloads.apache.org/httpd/httpd-2.4.58.tar.gz.sha512">SHA512</a> ]</p>
+<p>Source: <a href="[preferred]httpd/httpd-2.4.59.tar.gz">httpd-2.4.59.tar.gz</a> [
+<a href="https://downloads.apache.org/httpd/httpd-2.4.59.tar.gz.asc">PGP</a> ] [
+<a href="https://downloads.apache.org/httpd/httpd-2.4.59.tar.gz.sha256">SHA256</a> ] [
+<a href="https://downloads.apache.org/httpd/httpd-2.4.59.tar.gz.sha512">SHA512</a> ]</p>
</li>
<li>
<p><a href="[preferred]httpd/patches/">Security and official patches</a></p>
@@ -229,7 +229,7 @@ verify our releases and how to do it.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/index.html b/output/index.html
index a1d1bf0..0ec0fec 100644
--- a/output/index.html
+++ b/output/index.html
@@ -96,16 +96,16 @@ standards.</p>
April 1996. It has celebrated its 25th birthday as a project in February 2020.</p>
<p>The Apache HTTP Server is a project of <a href="http://www.apache.org/">The Apache Software
Foundation</a>.</p>
-<h1 id="apache-httpd-2458-released-2023-10-19">Apache httpd 2.4.58 Released <span>2023-10-19</span><a class="headerlink" href="#apache-httpd-2458-released-2023-10-19" title="Permalink">&para;</a></h1>
+<h1 id="apache-httpd-2459-released-2024-04-04">Apache httpd 2.4.59 Released <span>2024-04-04</span><a class="headerlink" href="#apache-httpd-2459-released-2024-04-04" title="Permalink">&para;</a></h1>
<p>The Apache Software Foundation and the Apache HTTP Server Project are
pleased to
<a href="http://downloads.apache.org/httpd/Announcement2.4.html">announce</a> the
-release of version 2.4.58 of the Apache HTTP Server ("httpd").</p>
+release of version 2.4.59 of the Apache HTTP Server ("httpd").</p>
<p>This latest release from the 2.4.x stable branch represents the best available
version of Apache HTTP Server.</p>
<p>Apache HTTP Server version 2.<span>4</span>.43 or newer is required in order to operate a TLS 1.3 web server with OpenSSL 1.1.1.</p>
-<p class="centered"><a href="download.cgi#apache24">Download</a> | <a href="http://downloads.apache.org/httpd/CHANGES_2.4.58">ChangeLog for
-2.4.58</a> | <a href="http://downloads.apache.org/httpd/CHANGES_2.4">Complete ChangeLog for
+<p class="centered"><a href="download.cgi#apache24">Download</a> | <a href="http://downloads.apache.org/httpd/CHANGES_2.4.59">ChangeLog for
+2.4.59</a> | <a href="http://downloads.apache.org/httpd/CHANGES_2.4">Complete ChangeLog for
2.4</a> | <a href="docs/trunk/new_features_2_4.html">New Features in httpd
2.4</a></p>
<h1 id="apache-httpd-22-end-of-life-2018-01-01">Apache httpd 2.2 End-of-Life <span>2018-01-01</span><a class="headerlink" href="#apache-httpd-22-end-of-life-2018-01-01" title="Permalink">&para;</a></h1>
@@ -127,7 +127,7 @@ PGP or MD5 signatures.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/info/index.html b/output/info/index.html
index 83e48d5..066296e 100644
--- a/output/info/index.html
+++ b/output/info/index.html
@@ -105,7 +105,7 @@ setup your site as an Apache mirror.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/lists.html b/output/lists.html
index 0d30d1f..02eee32 100644
--- a/output/lists.html
+++ b/output/lists.html
@@ -393,7 +393,7 @@ development questions to the <a href="#http-dev">Main Development Discussion Lis

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/mod_fcgid/index.html b/output/mod_fcgid/index.html
index b500da8..5b0aa23 100644
--- a/output/mod_fcgid/index.html
+++ b/output/mod_fcgid/index.html
@@ -133,7 +133,7 @@ Apache HTTP Server subproject in 2009, shepherded by Chris Darroch

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/mod_ftp/index.html b/output/mod_ftp/index.html
index f3b04d1..e280986 100644
--- a/output/mod_ftp/index.html
+++ b/output/mod_ftp/index.html
@@ -129,7 +129,7 @@ Project in 2007.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/mod_mbox/index.html b/output/mod_mbox/index.html
index 7dda716..84b6fa7 100644
--- a/output/mod_mbox/index.html
+++ b/output/mod_mbox/index.html
@@ -144,7 +144,7 @@ while Maxime worked on improving the module's user interface.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/mod_mbox/install.html b/output/mod_mbox/install.html
index 574f59c..8d9957c 100644
--- a/output/mod_mbox/install.html
+++ b/output/mod_mbox/install.html
@@ -166,7 +166,7 @@ information on these directives.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/mod_mbox/ref.html b/output/mod_mbox/ref.html
index e66020d..d16b107 100644
--- a/output/mod_mbox/ref.html
+++ b/output/mod_mbox/ref.html
@@ -142,7 +142,7 @@ obfuscation, thus avoiding spam to mailing list users. For exemple,

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/mod_smtpd/index.html b/output/mod_smtpd/index.html
index a2e2a5b..74dcdc1 100644
--- a/output/mod_smtpd/index.html
+++ b/output/mod_smtpd/index.html
@@ -143,7 +143,7 @@ commit logs for httpd, including mod_mbox (

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/mod_smtpd/install.html b/output/mod_smtpd/install.html
index f0a6e25..d531cc3 100644
--- a/output/mod_smtpd/install.html
+++ b/output/mod_smtpd/install.html
@@ -131,7 +131,7 @@ configuration here<br/>&lt;/VirtualHost

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/modules/index.html b/output/modules/index.html
index 9232182..f509b7e 100644
--- a/output/modules/index.html
+++ b/output/modules/index.html
@@ -256,7 +256,7 @@ Placeholder</a></li>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/security/impact_levels.html b/output/security/impact_levels.html
index 9365b51..c27c9e0 100644
--- a/output/security/impact_levels.html
+++ b/output/security/impact_levels.html
@@ -127,7 +127,7 @@ exploit gives minimal consequences.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/security/json/CVE-2023-38709.json b/output/security/json/CVE-2023-38709.json
new file mode 100644
index 0000000..81141c3
--- /dev/null
+++ b/output/security/json/CVE-2023-38709.json
@@ -0,0 +1,101 @@
+{
+ "containers": {
+ "cna": {
+ "affected": [.
+ {
+ "defaultStatus": "unaffected",
+ "product": "Apache HTTP Server",
+ "vendor": "Apache Software Foundation",
+ "versions": [.
+ {
+ "lessThanOrEqual": "2.4.58",
+ "status": "affected",
+ "version": "0",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [.
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Orange Tsai (@orange_8361) from DEVCORE"
+ }
+ ],
+ "descriptions": [.
+ {
+ "lang": "en",
+ "supportingMedia": [.
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.<br><br>This issue affects Apache HTTP Server: through 2.4.58.<br>"
+ }
+ ],
+ "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
+ }
+ ],
+ "metrics": [.
+ {
+ "cvssV3_1": {
+ "attackComplexity": "HIGH",
+ "attackVector": "NETWORK",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "privilegesRequired": "NONE",
+ "scope": "CHANGED",
+ "userInteraction": "NONE",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
+ "version": "3.1"
+ },
+ "format": "CVSS",
+ "scenarios": [.
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ]
+ }
+ ],
+ "problemTypes": [.
+ {
+ "descriptions": [.
+ {
+ "description": "HTTP response splitting",
+ "lang": "en"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
+ },
+ "source": {
+ "discovery": "EXTERNAL"
+ },
+ "title": "Apache HTTP Server: HTTP response splitting",
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ },
+ "timeline": [.
+ {
+ "lang": "eng",
+ "time": "2024-04-04",
+ "value": "2.4.59 released"
+ }
+ ]
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
+ "cveId": "CVE-2023-38709",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}
diff --git a/output/security/json/CVE-2024-24795.json b/output/security/json/CVE-2024-24795.json
new file mode 100644
index 0000000..d8c8ce6
--- /dev/null
+++ b/output/security/json/CVE-2024-24795.json
@@ -0,0 +1,96 @@
+{
+ "containers": {
+ "cna": {
+ "affected": [.
+ {
+ "defaultStatus": "unaffected",
+ "product": "Apache HTTP Server",
+ "vendor": "Apache Software Foundation",
+ "versions": [.
+ {
+ "lessThanOrEqual": "2.4.58",
+ "status": "affected",
+ "version": "2.4.0",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [.
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Keran Mu, Tsinghua University and Zhongguancun Laboratory."
+ },
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Jianjun Chen, Tsinghua University and Zhongguancun Laboratory."
+ }
+ ],
+ "descriptions": [.
+ {
+ "lang": "en",
+ "supportingMedia": [.
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.<br><br>Users are recommended to upgrade to version 2.4.59, which fixes this issue."
+ }
+ ],
+ "value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
+ }
+ ],
+ "metrics": [.
+ {
+ "other": {
+ "content": {
+ "text": "low"
+ },
+ "type": "Textual description of severity"
+ }
+ }
+ ],
+ "problemTypes": [.
+ {
+ "descriptions": [.
+ {
+ "description": "HTTP response splitting",
+ "lang": "en"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
+ },
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "timeline": [.
+ {
+ "lang": "en",
+ "time": "2023-09-06T11:37:00.000Z",
+ "value": "Reported to security team"
+ },
+ {
+ "lang": "eng",
+ "time": "2024-04-04",
+ "value": "2.4.59 released"
+ }
+ ],
+ "title": "Apache HTTP Server: HTTP Response Splitting in multiple modules",
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
+ "cveId": "CVE-2024-24795",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}
diff --git a/output/security/json/CVE-2024-27316.json b/output/security/json/CVE-2024-27316.json
new file mode 100644
index 0000000..b618442
--- /dev/null
+++ b/output/security/json/CVE-2024-27316.json
@@ -0,0 +1,93 @@
+{
+ "containers": {
+ "cna": {
+ "affected": [.
+ {
+ "defaultStatus": "unaffected",
+ "product": "Apache HTTP Server",
+ "vendor": "Apache Software Foundation",
+ "versions": [.
+ {
+ "lessThanOrEqual": "2.4.58",
+ "status": "affected",
+ "version": "2.4.17",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [.
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Bartek Nowotarski (https://nowotarski.info/) "
+ }
+ ],
+ "descriptions": [.
+ {
+ "lang": "en",
+ "supportingMedia": [.
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion."
+ }
+ ],
+ "value": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion."
+ }
+ ],
+ "metrics": [.
+ {
+ "other": {
+ "content": {
+ "text": "moderate"
+ },
+ "type": "Textual description of severity"
+ }
+ }
+ ],
+ "problemTypes": [.
+ {
+ "descriptions": [.
+ {
+ "cweId": "CWE-400",
+ "description": "CWE-400 Uncontrolled Resource Consumption",
+ "lang": "en",
+ "type": "CWE"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
+ },
+ "source": {
+ "discovery": "EXTERNAL"
+ },
+ "timeline": [.
+ {
+ "lang": "en",
+ "time": "2024-02-22T15:29:00.000Z",
+ "value": "Reported to security team"
+ },
+ {
+ "lang": "eng",
+ "time": "2024-04-04",
+ "value": "2.4.59 released"
+ }
+ ],
+ "title": "Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames",
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
+ "cveId": "CVE-2024-27316",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+}
diff --git a/output/security/vulnerabilities-httpd.json b/output/security/vulnerabilities-httpd.json
index 7f9d5ce..7a12819 100644
--- a/output/security/vulnerabilities-httpd.json
+++ b/output/security/vulnerabilities-httpd.json
@@ -4719,6 +4719,99 @@
}
}
},
+ {
+ "containers": {
+ "cna": {
+ "affected": [.
+ {
+ "defaultStatus": "unaffected",
+ "product": "Apache HTTP Server",
+ "vendor": "Apache Software Foundation",
+ "versions": [.
+ {
+ "lessThanOrEqual": "2.4.58",
+ "status": "affected",
+ "version": "2.4.17",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [.
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Bartek Nowotarski (https://nowotarski.info/) "
+ }
+ ],
+ "descriptions": [.
+ {
+ "lang": "en",
+ "supportingMedia": [.
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion."
+ }
+ ],
+ "value": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion."
+ }
+ ],
+ "metrics": [.
+ {
+ "other": {
+ "content": {
+ "text": "moderate"
+ },
+ "type": "Textual description of severity"
+ }
+ }
+ ],
+ "problemTypes": [.
+ {
+ "descriptions": [.
+ {
+ "cweId": "CWE-400",
+ "description": "CWE-400 Uncontrolled Resource Consumption",
+ "lang": "en",
+ "type": "CWE"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
+ },
+ "source": {
+ "discovery": "EXTERNAL"
+ },
+ "timeline": [.
+ {
+ "lang": "en",
+ "time": "2024-02-22T15:29:00.000Z",
+ "value": "Reported to security team"
+ },
+ {
+ "lang": "eng",
+ "time": "2024-04-04",
+ "value": "2.4.59 released"
+ }
+ ],
+ "title": "Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames",
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
+ "cveId": "CVE-2024-27316",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+ },
{
"data_type": "CVE",
"data_format": "MITRE",
@@ -5068,6 +5161,107 @@
}
}
},
+ {
+ "containers": {
+ "cna": {
+ "affected": [.
+ {
+ "defaultStatus": "unaffected",
+ "product": "Apache HTTP Server",
+ "vendor": "Apache Software Foundation",
+ "versions": [.
+ {
+ "lessThanOrEqual": "2.4.58",
+ "status": "affected",
+ "version": "0",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [.
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Orange Tsai (@orange_8361) from DEVCORE"
+ }
+ ],
+ "descriptions": [.
+ {
+ "lang": "en",
+ "supportingMedia": [.
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.<br><br>This issue affects Apache HTTP Server: through 2.4.58.<br>"
+ }
+ ],
+ "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
+ }
+ ],
+ "metrics": [.
+ {
+ "cvssV3_1": {
+ "attackComplexity": "HIGH",
+ "attackVector": "NETWORK",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.8,
+ "baseSeverity": "MEDIUM",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "privilegesRequired": "NONE",
+ "scope": "CHANGED",
+ "userInteraction": "NONE",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
+ "version": "3.1"
+ },
+ "format": "CVSS",
+ "scenarios": [.
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ]
+ }
+ ],
+ "problemTypes": [.
+ {
+ "descriptions": [.
+ {
+ "description": "HTTP response splitting",
+ "lang": "en"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
+ },
+ "source": {
+ "discovery": "EXTERNAL"
+ },
+ "title": "Apache HTTP Server: HTTP response splitting",
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ },
+ "timeline": [.
+ {
+ "lang": "eng",
+ "time": "2024-04-04",
+ "value": "2.4.59 released"
+ }
+ ]
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
+ "cveId": "CVE-2023-38709",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+ },
{
"data_type": "CVE",
"data_format": "MITRE",
@@ -16775,6 +16969,102 @@
}
}
},
+ {
+ "containers": {
+ "cna": {
+ "affected": [.
+ {
+ "defaultStatus": "unaffected",
+ "product": "Apache HTTP Server",
+ "vendor": "Apache Software Foundation",
+ "versions": [.
+ {
+ "lessThanOrEqual": "2.4.58",
+ "status": "affected",
+ "version": "2.4.0",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [.
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Keran Mu, Tsinghua University and Zhongguancun Laboratory."
+ },
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Jianjun Chen, Tsinghua University and Zhongguancun Laboratory."
+ }
+ ],
+ "descriptions": [.
+ {
+ "lang": "en",
+ "supportingMedia": [.
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.<br><br>Users are recommended to upgrade to version 2.4.59, which fixes this issue."
+ }
+ ],
+ "value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
+ }
+ ],
+ "metrics": [.
+ {
+ "other": {
+ "content": {
+ "text": "low"
+ },
+ "type": "Textual description of severity"
+ }
+ }
+ ],
+ "problemTypes": [.
+ {
+ "descriptions": [.
+ {
+ "description": "HTTP response splitting",
+ "lang": "en"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
+ },
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "timeline": [.
+ {
+ "lang": "en",
+ "time": "2023-09-06T11:37:00.000Z",
+ "value": "Reported to security team"
+ },
+ {
+ "lang": "eng",
+ "time": "2024-04-04",
+ "value": "2.4.59 released"
+ }
+ ],
+ "title": "Apache HTTP Server: HTTP Response Splitting in multiple modules",
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
+ }
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
+ "cveId": "CVE-2024-24795",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
+ },
{
"data_type": "CVE",
"data_format": "MITRE",
diff --git a/output/security/vulnerabilities_13.html b/output/security/vulnerabilities_13.html
index 6e0d006..ef5091d 100644
--- a/output/security/vulnerabilities_13.html
+++ b/output/security/vulnerabilities_13.html
@@ -398,7 +398,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/security/vulnerabilities_20.html b/output/security/vulnerabilities_20.html
index edc68d9..a084cae 100644
--- a/output/security/vulnerabilities_20.html
+++ b/output/security/vulnerabilities_20.html
@@ -722,7 +722,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/security/vulnerabilities_22.html b/output/security/vulnerabilities_22.html
index fd3e7c5..b67ff9b 100644
--- a/output/security/vulnerabilities_22.html
+++ b/output/security/vulnerabilities_22.html
@@ -784,7 +784,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/security/vulnerabilities_24.html b/output/security/vulnerabilities_24.html
deleted file mode 100644
index 03a718f..0000000
--- a/output/security/vulnerabilities_24.html
+++ /dev/null
@@ -1,1145 +0,0 @@
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
- "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml">
- <head>
- <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
- <link href="/css/apsite.css" rel="stylesheet" media="all" type="text/css" title="Main stylesheet" />
- <meta name="author" content="Documentation Group" /><meta name="email" content="docs@httpd.apache.org" />
- <title>Apache HTTP Server 2.4 vulnerabilities - The Apache HTTP Server Project</title>
- <style>
-.headerlink {
- visibility: hidden;
-}
-h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover > .headerlink, h5:hover > .headerlink, h6:hover > .headerlink, li:hover > .headerlink {
- visibility: visible
-}
- </style>
- </head>
- <body>
- <div id="page-header">
- <p class="menu">&nbsp;</p>
- <p class="apache">&nbsp;</p>
- <a href="/">
- <img alt="" width="800" height="72" src="/images/httpd_logo_wide_new.png" />
- </a>
- <a class="badge" href="https://www.apache.org/foundation/contributing.html">
- <img src="https://www.apache.org/images/SupportApache-small.png">
- </a>
- </div>
- <div id="apmenu">
- <script type="text/javascript" src="https://www.apachecon.com/event-images/snippet.js"></script>
- <p style="margin-top: -10px;">
- <!-- Apachecon! -->
- <a class="acevent" data-format="wide" data-mode="light" data-width="160"></a>
- </p>
- <h1 id="essentials">Essentials<a class="headerlink" href="#essentials" title="Permanent link">&para;</a></h1>
- <ul>
- <li><a href="/download.cgi">Download!</a></li>
- <li><a href="/ABOUT_APACHE.html">About</a></li>
- <li><a href="https://www.apache.org/licenses/">License</a></li>
- <li><a href="https://wiki.apache.org/httpd/FAQ">FAQ</a></li>
- <li><a href="/security_report.html">Security Reports</a></li>
- </ul>
- <h1 id="source-repositories">Source Repositories<a class="headerlink" href="#source-repositories" title="Permanent link">&para;</a></h1>
- <ul>
- <li><a href="/dev/devnotes.html">General Information</a></li>
- <li><a href="https://svn.apache.org/viewvc/httpd/httpd/trunk/">Trunk</a></li>
- <li><a href="https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/">2.4</a></li>
- </ul>
- <h1 id="documentation"><a href="/docs/">Documentation</a><a class="headerlink" href="#documentation" title="Permanent link">&para;</a></h1>
- <ul>
- <li><a href="/docs/2.4/">Version 2.4</a></li>
- <li><a href="/docs/trunk/">Trunk (dev)</a></li>
- <li><a href="https://wiki.apache.org/httpd/">Wiki</a></li>
- </ul>
- <h1 id="get-involved"><a href="/contribute/">Get Involved</a><a class="headerlink" href="#get-involved" title="Permanent link">&para;</a></h1>
- <ul>
- <li><a href="/lists.html">Mailing Lists</a></li>
- <li><a href="/bug_report.html">Bug Reports</a></li>
- <li><a href="/dev/">Developer Info</a></li>
- <li><a href="/support.html">User Support</a></li>
- </ul>
- <h1 id="subprojects">Subprojects<a class="headerlink" href="#subprojects" title="Permanent link">&para;</a></h1>
- <ul>
- <li><a href="/docs-project/">Docs</a></li>
- <li><a href="/test/">Test</a></li>
- <li><a href="/test/flood/">Flood</a></li>
- <li><a href="/apreq/">libapreq</a></li>
- <li><a href="/modules">Modules</a></li>
- <li><a href="/mod_fcgid/">mod_fcgid</a></li>
- <li><a href="/mod_ftp/">mod_ftp</a></li>
- </ul>
- <h1 id="related-projects">Related Projects<a class="headerlink" href="#related-projects" title="Permanent link">&para;</a></h1>
- <ul>
- <li><a href="https://trafficserver.apache.org/">Apache Traffic Server</a></li>
- <li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
- <li><a href="https://tomcat.apache.org/">Tomcat</a></li>
- <li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
- </ul>
- <h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
- <ul>
- <li><a href="/contributors/">Contributors</a></li>
- <li><a href="https://www.apache.org/foundation/thanks.html">Thanks!</a></li>
- <li><a href="https://www.apache.org/foundation/sponsorship.html">Sponsorship</a></li>
- </ul>
- </div>
- <!-- RIGHT SIDE INFORMATION -->
- <div id="apcontents">
- <h1>Apache HTTP Server 2.4 vulnerabilities</h1>
-<p>This page lists all security vulnerabilities fixed in released versions of Apache HTTP Server 2.4. Each vulnerability is given a security <a href="/security/impact_levels.html">impact rating</a> by the Apache security team - please note that this rating may well vary from platform to platform. We also list the versions the flaw is known to affect, and where a flaw has not been verified list the version with a question mark.</p>
-<p>Please note that if a vulnerability is shown below as being fixed in a "-dev" release then this means that a fix has been applied to the development source tree and will be part of an upcoming full release.</p>
-<p>Please send comments or corrections for these vulnerabilities to the <a href="/security_report.html">Security Team</a>.</p> <br/>
-<p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases. Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><br/>
-<h1 id="2.4.58">Fixed in Apache HTTP Server 2.4.58</h1><dl>
-<dt><h3 id="CVE-2023-31122">low: <name name="CVE-2023-31122">mod_macro buffer over-read</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2023-31122">CVE-2023-31122</a>)</h3></dt>
-<dd><p>Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.</p><p></p><p></p>
-<p>Acknowledgements: finder: David Shoon (github/davidshoon)</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.58 released</td><td class="cve-value">2023-10-19</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.57</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2023-43622">low: <name name="CVE-2023-43622">Apache HTTP Server: DoS in HTTP/2 with initial windows size 0</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2023-43622">CVE-2023-43622</a>)</h3></dt>
-<dd><p>An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern.</p><p>This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.</p><p></p><p>This issue affects Apache HTTP Server: from 2.4.55 through 2.4.5 [...]
-<p>Acknowledgements:</p>
-<ul>
-<li>finder: Prof. Sven Dietrich (City University of New York)</li>
-<li>finder: Isa Jafarov (City University of New York)</li>
-<li>finder: Prof. Heejo Lee (Korea University)</li>
-<li>finder: Choongin Lee (Korea University)</li>
-</ul>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-09-15</td></tr>
-<tr><td class="cve-header">Update 2.4.58 released</td><td class="cve-value">2023-10-19</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.57</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2023-45802">moderate: <name name="CVE-2023-45802">Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2023-45802">CVE-2023-45802</a>)</h3></dt>
-<dd><p>When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.</p><p></p><p>This was found by the report [...]
-<p>Acknowledgements:</p>
-<ul>
-<li>finder: Will Dormann of Vul Labs</li>
-<li>finder: David Warren of Vul Labs</li>
-</ul>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-10-12</td></tr>
-<tr><td class="cve-header">Update 2.4.58 released</td><td class="cve-value">2023-10-19</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.57</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.56">Fixed in Apache HTTP Server 2.4.56</h1><dl>
-<dt><h3 id="CVE-2023-25690">important: <name name="CVE-2023-25690">HTTP request splitting with mod_rewrite and mod_proxy</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2023-25690">CVE-2023-25690</a>)</h3></dt>
-<dd><p>Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.</p><p></p><p></p><p></p><p></p><p>Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.</p><p></p><p> For example, something [...]
-<p>Acknowledgements: finder: Lars Krapf of Adobe</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-02-02</td></tr>
-<tr><td class="cve-header">fixed by r1908095 in 2.4.x</td><td class="cve-value">2023-03-07</td></tr>
-<tr><td class="cve-header">Update 2.4.56 released</td><td class="cve-value">2023-03-07</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.55</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2023-27522">moderate: <name name="CVE-2023-27522">Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2023-27522">CVE-2023-27522</a>)</h3></dt>
-<dd><p>HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.</p><p></p><p>Special characters in the origin response header can truncate/split the response forwarded to the client.</p><p></p><p></p><p></p>
-<p>Acknowledgements: finder: Dimas Fariski Setyawan Putra (nyxsorcerer)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-01-29</td></tr>
-<tr><td class="cve-header">fixed by r1908094 in 2.4.x</td><td class="cve-value">2023-03-07</td></tr>
-<tr><td class="cve-header">Update 2.4.56 released</td><td class="cve-value">2023-03-07</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.55</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.55">Fixed in Apache HTTP Server 2.4.55</h1><dl>
-<dt><h3 id="CVE-2006-20001">moderate: <name name="CVE-2006-20001">mod_dav out of bounds read, or write of zero byte</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2006-20001">CVE-2006-20001</a>)</h3></dt>
-<dd><p>A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.</p><p></p><p>This issue affects Apache HTTP Server 2.4.54 and earlier.</p><p></p>
-<table class="table"><tr><td class="cve-header">Described in first edition of "The Art of Software Security Assessment"</td><td class="cve-value">2006-10-31</td></tr>
-<tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-08-10</td></tr>
-<tr><td class="cve-header">Update 2.4.55 released</td><td class="cve-value">2023-01-17</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.54</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-36760">moderate: <name name="CVE-2022-36760">Apache HTTP Server: mod_proxy_ajp Possible request smuggling</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-36760">CVE-2022-36760</a>)</h3></dt>
-<dd><p>Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.</p>
-<p>Acknowledgements: finder: ZeddYu_Lu from Qi'anxin Research Institute of Legendsec at Qi'anxin Group</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-07-12</td></tr>
-<tr><td class="cve-header">Update 2.4.55 released</td><td class="cve-value">2023-01-17</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.54</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-37436">moderate: <name name="CVE-2022-37436">Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-37436">CVE-2022-37436</a>)</h3></dt>
-<dd><p>Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.</p>
-<p>Acknowledgements: finder: Dimas Fariski Setyawan Putra (@nyxsorcerer)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-07-14</td></tr>
-<tr><td class="cve-header">Update 2.4.55 released</td><td class="cve-value">2023-01-17</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;2.4.55</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.54">Fixed in Apache HTTP Server 2.4.54</h1><dl>
-<dt><h3 id="CVE-2022-26377">moderate: <name name="CVE-2022-26377">mod_proxy_ajp: Possible request smuggling</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-26377">CVE-2022-26377</a>)</h3></dt>
-<dd><p>Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.</p>
-<p>Acknowledgements: Ricter Z @ 360 Noah Lab</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-03-02</td></tr>
-<tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-28330">low: <name name="CVE-2022-28330">read beyond bounds in mod_isapi</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-28330">CVE-2022-28330</a>)</h3></dt>
-<dd><p>Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module. </p>
-<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-28614">low: <name name="CVE-2022-28614">read beyond bounds via ap_rwrite() </name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-28614">CVE-2022-28614</a>)</h3></dt>
-<dd><p>The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.</p><p></p><p>Modules compiled and distributed separately from Apache HTTP Server that use the "ap_rputs" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.</p>
-<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
-<table class="table"><tr><td class="cve-header">Update released in 2.4.54</td><td class="cve-value">2022-06-08</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-28615">low: <name name="CVE-2022-28615">Read beyond bounds in ap_strcmp_match()</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-28615">CVE-2022-28615</a>)</h3></dt>
-<dd><p>Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.</p>
-<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-29404">low: <name name="CVE-2022-29404">Denial of service in mod_lua r:parsebody</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-29404">CVE-2022-29404</a>)</h3></dt>
-<dd><p>In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.</p>
-<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-30522">low: <name name="CVE-2022-30522">mod_sed denial of service</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-30522">CVE-2022-30522</a>)</h3></dt>
-<dd><p>If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.</p>
-<p>Acknowledgements: This issue was found by Brian Moussalli from the JFrog Security Research team</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.53</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-30556">low: <name name="CVE-2022-30556">Information Disclosure in mod_lua with websockets</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-30556">CVE-2022-30556</a>)</h3></dt>
-<dd><p>Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.</p>
-<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-31813">low: <name name="CVE-2022-31813">mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-31813">CVE-2022-31813</a>)</h3></dt>
-<dd><p>Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism.</p><p>This may be used to bypass IP based authentication on the origin server/application.</p>
-<p>Acknowledgements: The Apache HTTP Server project would like to thank Gaetan Ferry (Synacktiv) for reporting this issue</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.53">Fixed in Apache HTTP Server 2.4.53</h1><dl>
-<dt><h3 id="CVE-2022-22719">moderate: <name name="CVE-2022-22719">mod_lua Use of uninitialized value of in r:parsebody</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-22719">CVE-2022-22719</a>)</h3></dt>
-<dd><p>A carefully crafted request body can cause a read to a random memory area which could cause the process to crash.</p><p></p><p>This issue affects Apache HTTP Server 2.4.52 and earlier.</p>
-<p>Acknowledgements: Chamal De Silva</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-12-18</td></tr>
-<tr><td class="cve-header">fixed by r1898694 in 2.4.x</td><td class="cve-value">2022-03-07</td></tr>
-<tr><td class="cve-header">Update 2.4.53 released</td><td class="cve-value">2022-03-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.52</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-22720">important: <name name="CVE-2022-22720">HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-22720">CVE-2022-22720</a>)</h3></dt>
-<dd><p>Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling</p>
-<p>Acknowledgements: James Kettle &lt;james.kettle portswigger.net&gt;</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-12-17</td></tr>
-<tr><td class="cve-header">fixed by r1898692 in 2.4.x</td><td class="cve-value">2022-03-07</td></tr>
-<tr><td class="cve-header">Update 2.4.53 released</td><td class="cve-value">2022-03-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.52</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-22721">low: <name name="CVE-2022-22721">core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-22721">CVE-2022-22721</a>)</h3></dt>
-<dd><p>If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes.</p><p></p><p>This issue affects Apache HTTP Server 2.4.52 and earlier.</p>
-<p>Acknowledgements: Anonymous working with Trend Micro Zero Day Initiative</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-12-16</td></tr>
-<tr><td class="cve-header">fixed by r1898693 in 2.4.x</td><td class="cve-value">2022-03-07</td></tr>
-<tr><td class="cve-header">Update 2.4.53 released</td><td class="cve-value">2022-03-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.52</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2022-23943">important: <name name="CVE-2022-23943">mod_sed: Read/write beyond bounds</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2022-23943">CVE-2022-23943</a>)</h3></dt>
-<dd><p>Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data.</p><p></p><p>This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.</p>
-<p>Acknowledgements: Ronald Crane (Zippenhop LLC)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-01-13</td></tr>
-<tr><td class="cve-header">fixed by r1898695, r1898772 in 2.4.x</td><td class="cve-value">2022-03-09</td></tr>
-<tr><td class="cve-header">Update 2.4.53 released</td><td class="cve-value">2022-03-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.52</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.52">Fixed in Apache HTTP Server 2.4.52</h1><dl>
-<dt><h3 id="CVE-2021-44224">moderate: <name name="CVE-2021-44224">Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-44224">CVE-2021-44224</a>)</h3></dt>
-<dd><p>A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery).</p><p></p><p>This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).</p>
-<p>Acknowledgements:</p>
-<ul>
-<li>???</li>
-<li>TengMA(@Te3t123)</li>
-</ul>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-11-18</td></tr>
-<tr><td class="cve-header">fixed by r1895955, r1896044 in 2.4.x</td><td class="cve-value">2021-12-14</td></tr>
-<tr><td class="cve-header">Update 2.4.52 released</td><td class="cve-value">2021-12-20</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&gt;=2.4.7, &lt;=2.4.51</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-44790">important: <name name="CVE-2021-44790">Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-44790">CVE-2021-44790</a>)</h3></dt>
-<dd><p>A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts).</p><p>The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one.</p><p></p><p>This issue affects Apache HTTP Server 2.4.51 and earlier.</p>
-<p>Acknowledgements: Chamal</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-12-07</td></tr>
-<tr><td class="cve-header">Fixed by r1896039 in 2.4.x</td><td class="cve-value">2021-12-16</td></tr>
-<tr><td class="cve-header">Update 2.4.52 released</td><td class="cve-value">2021-12-20</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.51</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.51">Fixed in Apache HTTP Server 2.4.51</h1><dl>
-<dt><h3 id="CVE-2021-42013">critical: <name name="CVE-2021-42013">Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-42013">CVE-2021-42013</a>)</h3></dt>
-<dd><p>It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. </p><p></p><p>If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution.</p><p> [...]
-<p>Acknowledgements:</p>
-<ul>
-<li>Reported by Juan Escobar from Dreamlab Technologies</li>
-<li>Reported by Fernando Mu&ntilde;oz from NULL Life CTF Team</li>
-<li>Reported by Shungo Kumasaka</li>
-<li>Reported by Nattapon Jongcharoen</li>
-</ul>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-10-06</td></tr>
-<tr><td class="cve-header">fixed by r1893977, r1893980, r1893982 in 2.4.x</td><td class="cve-value">2021-10-07</td></tr>
-<tr><td class="cve-header">Update 2.4.51 released</td><td class="cve-value">2021-10-07</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.50, 2.4.49</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.50">Fixed in Apache HTTP Server 2.4.50</h1><dl>
-<dt><h3 id="CVE-2021-41524">moderate: <name name="CVE-2021-41524">null pointer dereference in h2 fuzzing</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-41524">CVE-2021-41524</a>)</h3></dt>
-<dd><p>While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing,</p><p>allowing an external source to DoS the server. This requires a specially crafted request. </p><p></p><p>The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.</p>
-<p>Acknowledgements: Apache httpd team would like to thank LI ZHI XIN from NSFocus Security Team for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-09-17</td></tr>
-<tr><td class="cve-header">fixed by r1893655 in 2.4.x</td><td class="cve-value">2021-09-26</td></tr>
-<tr><td class="cve-header">Update 2.4.50 released</td><td class="cve-value">2021-10-04</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.49</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-41773">critical: <name name="CVE-2021-41773">Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-41773">CVE-2021-41773</a>)</h3></dt>
-<dd><p>A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives.</p><p></p><p>If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution.</p><p></p><p>Th [...]
-<p>Acknowledgements: This issue was reported by Ash Daulton along with the cPanel Security Team</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-09-29</td></tr>
-<tr><td class="cve-header">fixed by r1893775 in 2.4.x</td><td class="cve-value">2021-10-01</td></tr>
-<tr><td class="cve-header">Update 2.4.50 released</td><td class="cve-value">2021-10-04</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.49</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.49">Fixed in Apache HTTP Server 2.4.49</h1><dl>
-<dt><h3 id="CVE-2021-33193">moderate: <name name="CVE-2021-33193">Request splitting via HTTP/2 method injection and mod_proxy</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-33193">CVE-2021-33193</a>)</h3></dt>
-<dd><p>A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning.</p><p></p><p>This issue affects Apache HTTP Server 2.4.17 to 2.4.48.</p>
-<p>Acknowledgements: Reported by James Kettle of PortSwigger</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-05-11</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-08-06</td></tr>
-<tr><td class="cve-header">Update 2.4.49 released</td><td class="cve-value">2021-09-16</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48, !&lt;2.4.17</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-34798">moderate: <name name="CVE-2021-34798">NULL pointer dereference in httpd core</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-34798">CVE-2021-34798</a>)</h3></dt>
-<dd><p>Malformed requests may cause the server to dereference a NULL pointer.</p><p></p><p></p><p>This issue affects Apache HTTP Server 2.4.48 and earlier.</p>
-<p>Acknowledgements: The issue was discovered by the Apache HTTP security team</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.49 released</td><td class="cve-value">2021-09-16</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-36160">moderate: <name name="CVE-2021-36160">mod_proxy_uwsgi out of bound read</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-36160">CVE-2021-36160</a>)</h3></dt>
-<dd><p>A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS).</p><p></p><p>This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).</p>
-<p>Acknowledgements: LI ZHI XIN from NSFocus Security Team</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-04-26</td></tr>
-<tr><td class="cve-header">Update 2.4.49 release</td><td class="cve-value">2021-09-16</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48, !&lt;2.4.30</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-39275">low: <name name="CVE-2021-39275">ap_escape_quotes buffer overflow</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-39275">CVE-2021-39275</a>)</h3></dt>
-<dd><p>ap_escape_quotes() may write beyond the end of a buffer when given malicious input. </p><p>No included modules pass untrusted data to these functions, but third-party / external modules may.</p><p></p><p>This issue affects Apache HTTP Server 2.4.48 and earlier.</p>
-<p>Acknowledgements: ClusterFuzz</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.49 released</td><td class="cve-value">2021-09-16</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-40438">important: <name name="CVE-2021-40438">mod_proxy SSRF</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-40438">CVE-2021-40438</a>)</h3></dt>
-<dd><p>A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user.</p><p></p><p>This issue affects Apache HTTP Server 2.4.48 and earlier.</p>
-<p>Acknowledgements: The issue was discovered by the Apache HTTP security team while analysing CVE-2021-36160</p>
-<table class="table"><tr><td class="cve-header">Update 2.4.49 released</td><td class="cve-value">2021-09-16</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.48">Fixed in Apache HTTP Server 2.4.48</h1><dl>
-<dt><h3 id="CVE-2019-17567">moderate: <name name="CVE-2019-17567">mod_proxy_wstunnel tunneling of non Upgraded connections</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-17567">CVE-2019-17567</a>)</h3></dt>
-<dd><p>Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.</p>
-<p>Acknowledgements: Reported by Mikhail Egorov (&lt;0ang3el gmail.com&gt;)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-10-05</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2020-13938">moderate: <name name="CVE-2020-13938">Improper Handling of Insufficient Privileges</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-13938">CVE-2020-13938</a>)</h3></dt>
-<dd><p>Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows</p>
-<p>Acknowledgements: Discovered by Ivan Zhakov</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-01-26</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2020-13950">low: <name name="CVE-2020-13950">mod_proxy_http NULL pointer dereference</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-13950">CVE-2020-13950</a>)</h3></dt>
-<dd><p>Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service</p>
-<p>Acknowledgements: Reported by Marc Stern (&lt;marc.stern approach.be&gt;)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-09-11</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2020-35452">low: <name name="CVE-2020-35452">mod_auth_digest possible stack overflow by one nul byte</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-35452">CVE-2020-35452</a>)</h3></dt>
-<dd><p>Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow</p>
-<p>Acknowledgements: This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-11-11</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-26690">low: <name name="CVE-2021-26690">mod_session NULL pointer dereference</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-26690">CVE-2021-26690</a>)</h3></dt>
-<dd><p>Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service</p>
-<p>Acknowledgements: This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-02-08</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-26691">low: <name name="CVE-2021-26691">mod_session response handling heap overflow</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-26691">CVE-2021-26691</a>)</h3></dt>
-<dd><p>Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted SessionHeader sent by an origin server could cause a heap overflow</p>
-<p>Acknowledgements: Discovered internally Christophe Jaillet</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-03-01</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-30641">moderate: <name name="CVE-2021-30641">Unexpected URL matching with 'MergeSlashes OFF'</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-30641">CVE-2021-30641</a>)</h3></dt>
-<dd><p>Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'</p>
-<p>Acknowledgements: Discovered by Christoph Anton Mitterer</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-04-14</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2021-31618">important: <name name="CVE-2021-31618">NULL pointer dereference on specially crafted HTTP/2 request</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2021-31618">CVE-2021-31618</a>)</h3></dt>
-<dd><p>Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected.</p><p></p><p>This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appea [...]
-<p>Acknowledgements: Apache HTTP server would like to thank LI ZHI XIN from NSFoucs for reporting this.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-04-22</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.47</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.44">Fixed in Apache HTTP Server 2.4.44</h1><dl>
-<dt><h3 id="CVE-2020-9490">important: <name name="CVE-2020-9490">Push Diary Crash on Specifically Crafted HTTP/2 Header</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-9490">CVE-2020-9490</a>)</h3></dt>
-<dd><p>In Apache HTTP Server versions 2.4.20 to 2.4.43, a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.</p>
-<p>Acknowledgements: Felix Wilhelm of Google Project Zero</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-04-24</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Update 2.4.44 released</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.43, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2020-11984">moderate: <name name="CVE-2020-11984">mod_proxy_uwsgi buffer overflow</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-11984">CVE-2020-11984</a>)</h3></dt>
-<dd><p>In Apache HTTP Server versions 2.4.32 to 2.4.43, mod_proxy_uwsgi has a information disclosure and possible RCE</p>
-<p>Acknowledgements: Discovered by Felix Wilhelm of Google Project Zero</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-07-22</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Update 2.4.44 released</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2020-11993">moderate: <name name="CVE-2020-11993">Push Diary Crash on Specifically Crafted HTTP/2 Header</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-11993">CVE-2020-11993</a>)</h3></dt>
-<dd><p>In Apache HTTP Server versions 2.4.20 to 2.4.43, when trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools.</p><p>Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.</p>
-<p>Acknowledgements: Felix Wilhelm of Google Project Zero</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-06-16</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Update 2.4.44 released</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.43, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.42">Fixed in Apache HTTP Server 2.4.42</h1><dl>
-<dt><h3 id="CVE-2020-1927">low: <name name="CVE-2020-1927">mod_rewrite CWE-601 open redirect</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-1927">CVE-2020-1927</a>)</h3></dt>
-<dd><p>In Apache HTTP Server versions 2.4.0 to 2.4.41 some mod_rewrite configurations vulnerable to open redirect.</p>
-<p>Acknowledgements: The issue was discovered by Fabrice Perez</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-12-05</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-04-01</td></tr>
-<tr><td class="cve-header">Update 2.4.42 released</td><td class="cve-value">2020-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.41, 2.4.40, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2020-1934">low: <name name="CVE-2020-1934">mod_proxy_ftp use of uninitialized value</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-1934">CVE-2020-1934</a>)</h3></dt>
-<dd><p>in Apache HTTP Server versions 2.4.0 to 2.4.41, mod_proxy_ftp use of uninitialized value with malicious FTP backend.</p>
-<p>Acknowledgements: The issue was discovered by Chamal De Silva</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-01-03</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-04-01</td></tr>
-<tr><td class="cve-header">Update 2.4.42 released</td><td class="cve-value">2020-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.41, 2.4.40, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.41">Fixed in Apache HTTP Server 2.4.41</h1><dl>
-<dt><h3 id="CVE-2019-9517">moderate: <name name="CVE-2019-9517">mod_http2, DoS attack by exhausting h2 workers.</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-9517">CVE-2019-9517</a>)</h3></dt>
-<dd><p>A malicious client could perform a DoS attack by flooding a connection with requests and basically never reading responses on the TCP connection. Depending on h2 worker dimensioning, it was possible to block those with relatively few connections.</p>
-<p>Acknowledgements: The issue was discovered by Jonathan Looney of Netflix.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-04-10</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.32, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-10081">moderate: <name name="CVE-2019-10081">mod_http2, memory corruption on early pushes</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10081">CVE-2019-10081</a>)</h3></dt>
-<dd><p>HTTP/2 very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.</p>
-<p>Acknowledgements: The issue was discovered by Craig Young of Tripwire VERT, &lt;vuln-report@secur3.us&gt;.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-04-10</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.32, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-10082">moderate: <name name="CVE-2019-10082">mod_http2, read-after-free in h2 connection shutdown</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10082">CVE-2019-10082</a>)</h3></dt>
-<dd><p>Using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.</p>
-<p>Acknowledgements: The issue was discovered by Craig Young of Tripwire VERT, &lt;vuln-report@secur3.us&gt;.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-04-12</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.32, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-10092">low: <name name="CVE-2019-10092">Limited cross-site scripting in mod_proxy error page</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10092">CVE-2019-10092</a>)</h3></dt>
-<dd><p>A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malfomed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. We have taken this opportunity to also remove request data from many other in-built error messages. Note however this issue did not [...]
-<p>Acknowledgements: This issue was reported by Matei "Mal" Badanoiu</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-07-09</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-10097">moderate: <name name="CVE-2019-10097">CVE-2019-10097 mod_remoteip: Stack buffer overflow and NULL pointer dereference</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10097">CVE-2019-10097</a>)</h3></dt>
-<dd><p>When mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.</p>
-<p>Acknowledgements: The issue was discovered by Daniel McCarney &lt;cpu@letsencrypt.org&gt; Let's Encrypt / Internet Security Research Group (ISRG)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-07-23</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-10098">low: <name name="CVE-2019-10098">mod_rewrite potential open redirect</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10098">CVE-2019-10098</a>)</h3></dt>
-<dd><p>Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.</p>
-<p>Acknowledgements: The issue was discovered by Yukitsugu Sasaki</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-03-26</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.39">Fixed in Apache HTTP Server 2.4.39</h1><dl>
-<dt><h3 id="CVE-2019-0196">low: <name name="CVE-2019-0196">mod_http2, read-after-free on a string compare</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0196">CVE-2019-0196</a>)</h3></dt>
-<dd><p>Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparision when determining the method of a request and thus process the request incorrectly.</p>
-<p>Acknowledgements: The issue was discovered by Craig Young, &lt;vuln-report@secur3.us&gt;.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-29</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-0197">low: <name name="CVE-2019-0197">mod_http2, possible crash on late upgrade</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0197">CVE-2019-0197</a>)</h3></dt>
-<dd><p>When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. A server that never enabled the h2 protocol or that only enabled it for https: and did not configure the "H2Upgrade on" is unaffected by this.</p>
-<p>Acknowledgements: The issue was discovered by Stefan Eissing, greenbytes.de.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-29</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-0211">important: <name name="CVE-2019-0211">Apache HTTP Server privilege escalation from modules' scripts</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0211">CVE-2019-0211</a>)</h3></dt>
-<dd><p>In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.</p>
-<p>Acknowledgements: The issue was discovered by Charles Fol.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-02-22</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-0215">important: <name name="CVE-2019-0215">mod_ssl access control bypass</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0215">CVE-2019-0215</a>)</h3></dt>
-<dd><p>In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions.</p>
-<p>Acknowledgements: The issue was discovered by Michael Kaufmann.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-23</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-0217">important: <name name="CVE-2019-0217">mod_auth_digest access control bypass</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0217">CVE-2019-0217</a>)</h3></dt>
-<dd><p>In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.</p>
-<p>Acknowledgements: The issue was discovered by Simon Kappel.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-29</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-0220">low: <name name="CVE-2019-0220">Apache httpd URL normalization inconsistincy</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0220">CVE-2019-0220</a>)</h3></dt>
-<dd><p>When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.</p>
-<p>Acknowledgements: The issue was discovered by Bernhard Lorenz &lt;bernhard.lorenz@alphastrike.io&gt; of Alpha Strike Labs GmbH.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-20</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.38">Fixed in Apache HTTP Server 2.4.38</h1><dl>
-<dt><h3 id="CVE-2018-17189">low: <name name="CVE-2018-17189">DoS for HTTP/2 connections via slow request bodies</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-17189">CVE-2018-17189</a>)</h3></dt>
-<dd><p>By sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.</p>
-<p>Acknowledgements: The issue was discovered by Gal Goldshtein of F5 Networks.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-10-16</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-01-22</td></tr>
-<tr><td class="cve-header">Update 2.4.38 released</td><td class="cve-value">2019-02-28</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2018-17199">low: <name name="CVE-2018-17199">mod_session_cookie does not respect expiry time</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-17199">CVE-2018-17199</a>)</h3></dt>
-<dd><p>In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.</p>
-<p>Acknowledgements: The issue was discovered by Diego Angulo from ImExHS.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-10-08</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-01-22</td></tr>
-<tr><td class="cve-header">Update 2.4.38 released</td><td class="cve-value">2019-02-28</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2019-0190">important: <name name="CVE-2019-0190">mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0190">CVE-2019-0190</a>)</h3></dt>
-<dd><p>A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts.</p>
-<p>Acknowledgements: The issue was discovered through user bug reports.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-01</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-01-22</td></tr>
-<tr><td class="cve-header">Update 2.4.38 released</td><td class="cve-value">2019-02-28</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.37</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.35">Fixed in Apache HTTP Server 2.4.35</h1><dl>
-<dt><h3 id="CVE-2018-11763">low: <name name="CVE-2018-11763">DoS for HTTP/2 connections by continuous SETTINGS</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-11763">CVE-2018-11763</a>)</h3></dt>
-<dd><p>By sending continous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol.</p>
-<p>Acknowledgements: The issue was discovered by Gal Goldshtein of F5 Networks.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-07-18</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-09-25</td></tr>
-<tr><td class="cve-header">Update 2.4.35 released</td><td class="cve-value">2018-09-29</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.34">Fixed in Apache HTTP Server 2.4.34</h1><dl>
-<dt><h3 id="CVE-2018-1333">low: <name name="CVE-2018-1333">DoS for HTTP/2 connections by crafted requests</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1333">CVE-2018-1333</a>)</h3></dt>
-<dd><p>By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. This issue only affects servers that have configured and enabled HTTP/2 support, which is not the default</p>
-<p>Acknowledgements: The issue was discovered by Craig Young of Tripwire VERT.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-05-08</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-07-18</td></tr>
-<tr><td class="cve-header">Update 2.4.34 released</td><td class="cve-value">2018-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2018-8011">moderate: <name name="CVE-2018-8011">mod_md, DoS via Coredumps on specially crafted requests</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-8011">CVE-2018-8011</a>)</h3></dt>
-<dd><p>By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server.</p>
-<p>Acknowledgements: The issue was discovered by Daniel Caminada &lt;daniel.caminada@ergon.ch&gt;.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-06-29</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-07-18</td></tr>
-<tr><td class="cve-header">Update 2.4.34 released</td><td class="cve-value">2018-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.33</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.33">Fixed in Apache HTTP Server 2.4.33</h1><dl>
-<dt><h3 id="CVE-2017-15710">low: <name name="CVE-2017-15710">Out of bound write in mod_authnz_ldap when using too small Accept-Language values</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-15710">CVE-2017-15710</a>)</h3></dt>
-<dd><p>mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory locati [...]
-<p>Acknowledgements: The Apache HTTP Server security team would like to thank Alex Nichols and Jakob Hirsch for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-12-07</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2017-15715">low: <name name="CVE-2017-15715">&lt;FilesMatch&gt; bypass with a trailing newline in the file name</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-15715">CVE-2017-15715</a>)</h3></dt>
-<dd><p>The expression specified in &lt;FilesMatch&gt; could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.</p>
-<p>Acknowledgements: The issue was discovered by Elar Lang - security.elarlang.eu</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-11-24</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2018-1283">moderate: <name name="CVE-2018-1283">Tampering of mod_session data for CGI applications</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1283">CVE-2018-1283</a>)</h3></dt>
-<dd><p>When mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. The severity is set to Moderate because "SessionEnv on" is not a default nor common con [...]
-<p>Acknowledgements: The issue was discovered internally by the Apache HTTP Server team.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-11-14</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2018-1301">low: <name name="CVE-2018-1301">Possible out of bound access after failure in reading the HTTP request</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1301">CVE-2018-1301</a>)</h3></dt>
-<dd><p>A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.33, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.</p>
-<p>Acknowledgements: The issue was discovered by Robert Swiecki, bug found by honggfuzz.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-01-23</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2018-1302">low: <name name="CVE-2018-1302">Possible write of after free on HTTP/2 stream shutdown</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1302">CVE-2018-1302</a>)</h3></dt>
-<dd><p>When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.33 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerabilty hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.</p>
-<p>Acknowledgements: The issue was discovered by Robert Swiecki, bug found by honggfuzz.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-01-23</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2018-1303">low: <name name="CVE-2018-1303">Possible out of bound read in mod_cache_socache</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1303">CVE-2018-1303</a>)</h3></dt>
-<dd><p>A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.33 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache.</p>
-<p>Acknowledgements: The issue was discovered by Robert Swiecki, bug found by honggfuzz.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-01-23</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2018-1312">low: <name name="CVE-2018-1312">Weak Digest auth nonce generation in mod_auth_digest</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1312">CVE-2018-1312</a>)</h3></dt>
-<dd><p>When generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.</p>
-<p>Acknowledgements: The issue was discovered by Nicolas Daniels.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-03-05</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.28">Fixed in Apache HTTP Server 2.4.28</h1><dl>
-<dt><h3 id="CVE-2017-9798">low: <name name="CVE-2017-9798">Use-after-free when using &lt;Limit &gt; with an unrecognized method in .htaccess ("OptionsBleed")</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-9798">CVE-2017-9798</a>)</h3></dt>
-<dd><p>When an unrecognized HTTP Method is given in an &lt;Limit {method}&gt; directive in an .htaccess file, and that .htaccess file is processed by the corresponding request, the global methods table is corrupted in the current worker process, resulting in erratic behaviour. This behavior may be avoided by listing all unusual HTTP Methods in a global httpd.conf RegisterHttpMethod directive in httpd release 2.4.25 and later. To permit other .htaccess directives while denying the &lt;Lim [...]
-<p>Acknowledgements: We would like to thank Hanno B&ouml;ck for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-07-12</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-09-18</td></tr>
-<tr><td class="cve-header">Update 2.4.28 released</td><td class="cve-value">2017-10-05</td></tr>
-<tr><td class="cve-header">Update 2.2.35-never released</td><td class="cve-value">--</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.34, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.27">Fixed in Apache HTTP Server 2.4.27</h1><dl>
-<dt><h3 id="CVE-2017-9788">important: <name name="CVE-2017-9788">Uninitialized memory reflection in mod_auth_digest</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-9788">CVE-2017-9788</a>)</h3></dt>
-<dd><p>The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault.</p>
-<p>Acknowledgements: We would like to thank Robert ?wi?cki for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-06-28</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Update 2.4.27 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2017-9789">important: <name name="CVE-2017-9789">Read after free in mod_http2</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-9789">CVE-2017-9789</a>)</h3></dt>
-<dd><p>When under stress, closing many connections, the HTTP/2 handling code would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.</p>
-<p>Acknowledgements: We would like to thank Robert ?wi?cki for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-06-30</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Update 2.4.27 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.26</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.26">Fixed in Apache HTTP Server 2.4.26</h1><dl>
-<dt><h3 id="CVE-2017-3167">important: <name name="CVE-2017-3167">ap_get_basic_auth_pw() Authentication Bypass</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-3167">CVE-2017-3167</a>)</h3></dt>
-<dd><p>Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. Third-party module writers SHOULD use ap_get_basic_auth_components(), available in 2.2.34 and 2.4.26, instead of ap_get_basic_auth_pw(). Modules which call the legacy ap_get_basic_auth_pw() during the authentication phase MUST either immediately authenticate the user after the call, or else stop the request immediately with an error r [...]
-<p>Acknowledgements: We would like to thank Emmanuel Dreyfus for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-02-06</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2017-3169">important: <name name="CVE-2017-3169">mod_ssl Null Pointer Dereference</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-3169">CVE-2017-3169</a>)</h3></dt>
-<dd><p>mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.</p>
-<p>Acknowledgements: We would like to thank Vasileios Panopoulos and AdNovum Informatik AG for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-12-05</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2017-7659">important: <name name="CVE-2017-7659">mod_http2 Null Pointer Dereference</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-7659">CVE-2017-7659</a>)</h3></dt>
-<dd><p>A maliciously constructed HTTP/2 request could cause mod_http2 to dereference a NULL pointer and crash the server process.</p>
-<p>Acknowledgements: We would like to thank Robert ?wi?cki for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-11-18</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2017-7668">important: <name name="CVE-2017-7668">ap_find_token() Buffer Overread</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-7668">CVE-2017-7668</a>)</h3></dt>
-<dd><p>The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.</p>
-<p>Acknowledgements: We would like to thank Javier Jim&eacute;nez (javijmor@gmail.com) for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-05-06</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.2.32</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2017-7679">important: <name name="CVE-2017-7679">mod_mime Buffer Overread</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2017-7679">CVE-2017-7679</a>)</h3></dt>
-<dd><p>mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.</p>
-<p>Acknowledgements: We would like to thank ChenQin and Hanno B&ouml;ck for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-11-15</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
-<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.25">Fixed in Apache HTTP Server 2.4.25</h1><dl>
-<dt><h3 id="CVE-2016-0736">low: <name name="CVE-2016-0736">Padding Oracle in Apache mod_session_crypto</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2016-0736">CVE-2016-0736</a>)</h3></dt>
-<dd><p>Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. An authentication tag (SipHash MAC) is now added to prevent such attacks.</p>
-<p>Acknowledgements: We would like to thank individuals at the RedTeam Pentesting GmbH for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-01-20</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2016-2161">low: <name name="CVE-2016-2161">DoS vulnerability in mod_auth_digest</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2016-2161">CVE-2016-2161</a>)</h3></dt>
-<dd><p>Malicious input to mod_auth_digest will cause the server to crash, and each instance continues to crash even for subsequently valid requests.</p>
-<p>Acknowledgements: We would like to thank Maksim Malyutin for reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-07-11</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2016-4975">moderate: <name name="CVE-2016-4975">mod_userdir CRLF injection</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2016-4975">CVE-2016-4975</a>)</h3></dt>
-<dd><p>Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value.</p>
-<p>Acknowledgements: The issue was discovered by Sergey Bobrov</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-07-24</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-08-14</td></tr>
-<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2017-01-13</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2016-5387">n/a: <name name="CVE-2016-5387">HTTP_PROXY environment variable "httpoxy" mitigation</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2016-5387">CVE-2016-5387</a>)</h3></dt>
-<dd><p>HTTP_PROXY is a well-defined environment variable in a CGI process, which collided with a number of libraries which failed to avoid colliding with this CGI namespace. A mitigation is provided for the httpd CGI environment to avoid populating the "HTTP_PROXY" variable from a "Proxy:" header, which has never been registered by IANA. This workaround and patch are documented in the ASF Advisory at asf-httpoxy-response.txt and incorporated in the 2.4.25 and 2.2.32 releases. Note: This [...]
-<p>Acknowledgements: We would like to thank Dominic Scheirlinck and Scott Geary of Vend for reporting and proposing a fix for this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-07-02</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-07-18</td></tr>
-<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2016-07-18</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2016-8740">low: <name name="CVE-2016-8740">HTTP/2 CONTINUATION denial of service</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2016-8740">CVE-2016-8740</a>)</h3></dt>
-<dd><p>The HTTP/2 protocol implementation (mod_http2) had an incomplete handling of the LimitRequestFields directive. This allowed an attacker to inject unlimited request headers into the server, leading to eventual memory exhaustion.</p>
-<p>Acknowledgements: We would like to thank Naveen Tiwari and CDF/SEFCOM at Arizona State University to reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-11-22</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-04</td></tr>
-<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2016-8743">important: <name name="CVE-2016-8743">Apache HTTP Request Parsing Whitespace Defects</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2016-8743">CVE-2016-8743</a>)</h3></dt>
-<dd><p>Apache HTTP Server, prior to release 2.4.25 (and 2.2.32), accepted a broad pattern of unusual whitespace patterns from the user-agent, including bare CR, FF, VTAB in parsing the request line and request header lines, as well as HTAB in parsing the request line. Any bare CR present in request lines was treated as whitespace and remained in the request field member "the_request", while a bare CR in the request header field name would be honored as whitespace, and a bare CR in the re [...]
-<p>Acknowledgements: We would like to thank David Dennerline at IBM Security's X-Force Researchers as well as R&eacute;gis Leroy for each reporting this issue.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-02-10</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
-<tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2017-01-13</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2020-11985">low: <name name="CVE-2020-11985">IP address spoofing when proxying using mod_remoteip and mod_rewrite</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2020-11985">CVE-2020-11985</a>)</h3></dt>
-<dd><p>For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.</p>
-<p>Acknowledgements: </p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-10-13</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2020-08-07</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.23">Fixed in Apache HTTP Server 2.4.23</h1><dl>
-<dt><h3 id="CVE-2016-4979">important: <name name="CVE-2016-4979">TLS/SSL X.509 client certificate auth bypass with HTTP/2</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2016-4979">CVE-2016-4979</a>)</h3></dt>
-<dd><p>For configurations enabling support for HTTP/2, SSL client certificate validation was not enforced if configured, allowing clients unauthorized access to protected resources over HTTP/2. This issue affected releases 2.4.18 and 2.4.20 only.</p>
-<p>Acknowledgements: This issue was reported by Erki Aring.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-06-30</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-07-05</td></tr>
-<tr><td class="cve-header">Update 2.4.23 released</td><td class="cve-value">2016-07-05</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.20, 2.4.18</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.20">Fixed in Apache HTTP Server 2.4.20</h1><dl>
-<dt><h3 id="CVE-2016-1546">low: <name name="CVE-2016-1546">mod_http2: denial of service by thread starvation</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2016-1546">CVE-2016-1546</a>)</h3></dt>
-<dd><p>By manipulating the flow control windows on streams, a client was able to block server threads for long times, causing starvation of worker threads. Connections could still be opened, but no streams where processed for these. This issue affected HTTP/2 support in 2.4.17 and 2.4.18.</p>
-<p>Acknowledgements: This issue was reported by Noam Mazor.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-02-02</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-04-11</td></tr>
-<tr><td class="cve-header">Update 2.4.20 released</td><td class="cve-value">2016-04-11</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.18, 2.4.17</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.16">Fixed in Apache HTTP Server 2.4.16</h1><dl>
-<dt><h3 id="CVE-2015-0228">low: <name name="CVE-2015-0228">mod_lua: Crash in websockets PING handling</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2015-0228">CVE-2015-0228</a>)</h3></dt>
-<dd><p>A stack recursion crash in the mod_lua module was found. A Lua script executing the r:wsupgrade() function could crash the process if a malicious client sent a carefully crafted PING request. This issue affected releases 2.4.7 through 2.4.12 inclusive.</p>
-<p>Acknowledgements: This issue was reported by Guido Vranken.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-01-28</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2015-02-04</td></tr>
-<tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.4.9, 2.4.7</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2015-0253">low: <name name="CVE-2015-0253">Crash in ErrorDocument 400 handling</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2015-0253">CVE-2015-0253</a>)</h3></dt>
-<dd><p>A crash in ErrorDocument handling was found. If ErrorDocument 400 was configured pointing to a local URL-path with the INCLUDES filter active, a NULL dereference would occur when handling the error, causing the child process to crash. This issue affected the 2.4.12 release only.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-02-03</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2015-03-05</td></tr>
-<tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2015-3183">low: <name name="CVE-2015-3183">HTTP request smuggling attack against chunked request parser</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2015-3183">CVE-2015-3183</a>)</h3></dt>
-<dd><p>An HTTP request smuggling attack was possible due to a bug in parsing of chunked requests. A malicious client could force the server to misinterpret the request length, allowing cache poisoning or credential hijacking if an intermediary proxy is in use.</p>
-<p>Acknowledgements: This issue was reported by R&eacute;gis Leroy.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-04-04</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2015-06-09</td></tr>
-<tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
-<tr><td class="cve-header">Update 2.2.31 released</td><td class="cve-value">2015-07-16</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2015-3185">low: <name name="CVE-2015-3185">ap_some_auth_required API unusable</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2015-3185">CVE-2015-3185</a>)</h3></dt>
-<dd><p>A design error in the "ap_some_auth_required" function renders the API unusuable in httpd 2.4.x. In particular the API is documented to answering if the request required authentication but only answers if there are Require lines in the applicable configuration. Since 2.4.x Require lines are used for authorization as well and can appear in configurations even when no authentication is required and the request is entirely unrestricted. This could lead to modules using this API to al [...]
-<p>Acknowledgements: This issue was reported by Ben Reser.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-08-05</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2015-06-09</td></tr>
-<tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.5, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.12">Fixed in Apache HTTP Server 2.4.12</h1><dl>
-<dt><h3 id="CVE-2013-5704">low: <name name="CVE-2013-5704">HTTP Trailers processing bypass</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2013-5704">CVE-2013-5704</a>)</h3></dt>
-<dd><p>HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. This fix adds the "MergeTrailers" directive to restore legacy behavior.</p>
-<p>Acknowledgements: This issue was reported by Martin Holst Swende.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-09-06</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-10-19</td></tr>
-<tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
-<tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2014-3581">low: <name name="CVE-2014-3581">mod_cache crash with empty Content-Type header</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-3581">CVE-2014-3581</a>)</h3></dt>
-<dd><p>A NULL pointer deference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. This crash would only be a denial of service if using a threaded MPM.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-09-08</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-09-08</td></tr>
-<tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2014-3583">low: <name name="CVE-2014-3583">mod_proxy_fcgi out-of-bounds memory read</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-3583">CVE-2014-3583</a>)</h3></dt>
-<dd><p>An out-of-bounds memory read was found in mod_proxy_fcgi. A malicious FastCGI server could send a carefully crafted response which could lead to a crash when reading past the end of a heap memory or stack buffer. This issue affects version 2.4.10 only.</p>
-<p>Acknowledgements: This issue was reported by Teguh P. Alko.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-09-17</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-11-12</td></tr>
-<tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2014-8109">low: <name name="CVE-2014-8109">mod_lua multiple "Require" directive handling is broken</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-8109">CVE-2014-8109</a>)</h3></dt>
-<dd><p>Fix handling of the Require line in mod_lau when a LuaAuthzProvider is used in multiple Require directives with different arguments. This could lead to different authentication rules than expected.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-11-09</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-11-09</td></tr>
-<tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.10">Fixed in Apache HTTP Server 2.4.10</h1><dl>
-<dt><h3 id="CVE-2014-0117">moderate: <name name="CVE-2014-0117">mod_proxy denial of service</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0117">CVE-2014-0117</a>)</h3></dt>
-<dd><p>A flaw was found in mod_proxy in httpd versions 2.4.6 to 2.4.9. A remote attacker could send a carefully crafted request to a server configured as a reverse proxy, and cause the child process to crash. This could lead to a denial of service against a threaded MPM.</p>
-<p>Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-04-07</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-15</td></tr>
-<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2014-0118">moderate: <name name="CVE-2014-0118">mod_deflate denial of service</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0118">CVE-2014-0118</a>)</h3></dt>
-<dd><p>A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration.</p>
-<p>Acknowledgements: This issue was reported by Giancarlo Pellegrino and Davide Balzarotti</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-02-19</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
-<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
-<tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2014-0226">moderate: <name name="CVE-2014-0226">mod_status buffer overflow</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0226">CVE-2014-0226</a>)</h3></dt>
-<dd><p>A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page.</p>
-<p>Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-05-30</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
-<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
-<tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2014-0231">important: <name name="CVE-2014-0231">mod_cgid denial of service</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0231">CVE-2014-0231</a>)</h3></dt>
-<dd><p>A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service.</p>
-<p>Acknowledgements: This issue was reported by Rainer Jung of the ASF</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-06-16</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
-<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
-<tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2014-3523">important: <name name="CVE-2014-3523">WinNT MPM denial of service</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-3523">CVE-2014-3523</a>)</h3></dt>
-<dd><p>A flaw was found in the WinNT MPM in httpd versions 2.4.1 to 2.4.9, when using the default AcceptFilter for that platform. A remote attacker could send carefully crafted requests that would leak memory and eventually lead to a denial of service against the server.</p>
-<p>Acknowledgements: This issue was reported by Jeff Trawick of the ASF</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-07-01</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-15</td></tr>
-<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.9">Fixed in Apache HTTP Server 2.4.9</h1><dl>
-<dt><h3 id="CVE-2013-6438">moderate: <name name="CVE-2013-6438">mod_dav crash</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2013-6438">CVE-2013-6438</a>)</h3></dt>
-<dd><p>XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn.</p>
-<p>Acknowledgements: This issue was reported by Ning Zhang &amp; Amin Tora of Neustar</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-12-10</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-03-17</td></tr>
-<tr><td class="cve-header">Update 2.4.9 released</td><td class="cve-value">2014-03-17</td></tr>
-<tr><td class="cve-header">Update 2.2.27 released</td><td class="cve-value">2014-03-26</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2014-0098">low: <name name="CVE-2014-0098">mod_log_config crash</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0098">CVE-2014-0098</a>)</h3></dt>
-<dd><p>A flaw was found in mod_log_config. A remote attacker could send a specific truncated cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.</p>
-<p>Acknowledgements: This issue was reported by Rainer M Canavan</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-02-25</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-03-17</td></tr>
-<tr><td class="cve-header">Update 2.4.9 released</td><td class="cve-value">2014-03-17</td></tr>
-<tr><td class="cve-header">Update 2.2.27 released</td><td class="cve-value">2014-03-26</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.7">Fixed in Apache HTTP Server 2.4.7</h1><dl>
-<dt><h3 id="CVE-2013-4352">low: <name name="CVE-2013-4352">mod_cache crash</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2013-4352">CVE-2013-4352</a>)</h3></dt>
-<dd><p>A NULL pointer dereference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. (Note that this vulnerability was fixed in the 2.4.7 release, but the security impact was not disclosed at the time of the release.)</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-09-14</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
-<tr><td class="cve-header">Update 2.4.7 released</td><td class="cve-value">2013-11-26</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.6</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.6">Fixed in Apache HTTP Server 2.4.6</h1><dl>
-<dt><h3 id="CVE-2013-1896">moderate: <name name="CVE-2013-1896">mod_dav crash</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2013-1896">CVE-2013-1896</a>)</h3></dt>
-<dd><p>Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.</p>
-<p>Acknowledgements: This issue was reported by Ben Reser</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-03-07</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-05-23</td></tr>
-<tr><td class="cve-header">Update 2.4.6 released</td><td class="cve-value">2013-07-22</td></tr>
-<tr><td class="cve-header">Update 2.2.25 released</td><td class="cve-value">2013-07-22</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2013-2249">moderate: <name name="CVE-2013-2249">mod_session_dbd session fixation flaw</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2013-2249">CVE-2013-2249</a>)</h3></dt>
-<dd><p>A flaw in mod_session_dbd caused it to proceed with save operations for a session without considering the dirty flag and the requirement for a new session ID.</p>
-<p>Acknowledgements: This issue was reported by Takashi Sato</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-05-29</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-07-22</td></tr>
-<tr><td class="cve-header">Update 2.4.6 released</td><td class="cve-value">2013-07-22</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.4">Fixed in Apache HTTP Server 2.4.4</h1><dl>
-<dt><h3 id="CVE-2012-3499">low: <name name="CVE-2012-3499">XSS due to unescaped hostnames</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2012-3499">CVE-2012-3499</a>)</h3></dt>
-<dd><p>Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.</p>
-<p>Acknowledgements: This issue was reported by Niels Heinen of Google</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-07-11</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-02-18</td></tr>
-<tr><td class="cve-header">Update 2.4.4 released</td><td class="cve-value">2013-02-25</td></tr>
-<tr><td class="cve-header">Update 2.2.24 released</td><td class="cve-value">2013-02-25</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.3, 2.4.2, 2.4.1, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2012-4558">moderate: <name name="CVE-2012-4558">XSS in mod_proxy_balancer</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2012-4558">CVE-2012-4558</a>)</h3></dt>
-<dd><p>A XSS flaw affected the mod_proxy_balancer manager interface.</p>
-<p>Acknowledgements: This issue was reported by Niels Heinen of Google</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-10-07</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-02-18</td></tr>
-<tr><td class="cve-header">Update 2.4.4 released</td><td class="cve-value">2013-02-25</td></tr>
-<tr><td class="cve-header">Update 2.2.24 released</td><td class="cve-value">2013-02-25</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.3, 2.4.2, 2.4.1, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.3">Fixed in Apache HTTP Server 2.4.3</h1><dl>
-<dt><h3 id="CVE-2012-2687">low: <name name="CVE-2012-2687">XSS in mod_negotiation when untrusted uploads are supported</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2012-2687">CVE-2012-2687</a>)</h3></dt>
-<dd><p>Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled. Note: This issue is also known as CVE-2008-0455.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-05-31</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2012-06-13</td></tr>
-<tr><td class="cve-header">Update 2.2.23 released</td><td class="cve-value">2012-09-13</td></tr>
-<tr><td class="cve-header">Update 2.4.3 released</td><td class="cve-value">2012-08-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.2, 2.4.1, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-<dt><h3 id="CVE-2012-3502">important: <name name="CVE-2012-3502">Response mixup when using mod_proxy_ajp or mod_proxy_http</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2012-3502">CVE-2012-3502</a>)</h3></dt>
-<dd><p>The modules mod_proxy_ajp and mod_proxy_http did not always close the connection to the back end server when necessary as part of error handling. This could lead to an information disclosure due to a response mixup between users.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-08-16</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2012-08-16</td></tr>
-<tr><td class="cve-header">Update 2.4.3 released</td><td class="cve-value">2012-08-21</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.2, 2.4.1</td></tr>
-</table></dd>
-</dl>
-<h1 id="2.4.2">Fixed in Apache HTTP Server 2.4.2</h1><dl>
-<dt><h3 id="CVE-2012-0883">low: <name name="CVE-2012-0883">insecure LD_LIBRARY_PATH handling</name>
-(<a href="https://www.cve.org/CVERecord?id=CVE-2012-0883">CVE-2012-0883</a>)</h3></dt>
-<dd><p>Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory.</p>
-<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-02-14</td></tr>
-<tr><td class="cve-header">Issue public</td><td class="cve-value">2012-03-02</td></tr>
-<tr><td class="cve-header">Update 2.4.2 released</td><td class="cve-value">2012-04-17</td></tr>
-<tr><td class="cve-header">Update 2.2.23 released</td><td class="cve-value">2012-09-13</td></tr>
-<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.1, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
-</table></dd>
-</dl>
-
- <!-- FOOTER -->
- <div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
- Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
- </div>
- </div>
- </body>
-</html>
\ No newline at end of file
diff --git a/output/security_report.html b/output/security_report.html
index c3b24ff..cafb958 100644
--- a/output/security_report.html
+++ b/output/security_report.html
@@ -140,7 +140,7 @@ updates and should not be used.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/support.html b/output/support.html
index 77961e5..3a572a0 100644
--- a/output/support.html
+++ b/output/support.html
@@ -114,7 +114,7 @@ one.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/test/flood/building.html b/output/test/flood/building.html
index f2076fa..86731db 100644
--- a/output/test/flood/building.html
+++ b/output/test/flood/building.html
@@ -121,7 +121,7 @@ installation. If you have any questions, please email the

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/test/flood/faq.html b/output/test/flood/faq.html
index 6a7b4b9..83f2a8c 100644
--- a/output/test/flood/faq.html
+++ b/output/test/flood/faq.html
@@ -112,7 +112,7 @@ your operating systems' manuals on how to decrease the FIN timeout.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/test/flood/index.html b/output/test/flood/index.html
index f7d7828..029e48a 100644
--- a/output/test/flood/index.html
+++ b/output/test/flood/index.html
@@ -151,7 +151,7 @@ Site"/></form></center>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/test/index.html b/output/test/index.html
index b9bd15b..ffcd18d 100644
--- a/output/test/index.html
+++ b/output/test/index.html
@@ -164,7 +164,7 @@ Archives</a></p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/usersdelist.html b/output/usersdelist.html
index 01afae9..20cabf0 100644
--- a/output/usersdelist.html
+++ b/output/usersdelist.html
@@ -166,7 +166,7 @@ usenet newsgroups for a much larger archive of Apache-related postings.</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
diff --git a/output/userslist.html b/output/userslist.html
index 8d6f571..7da90ec 100644
--- a/output/userslist.html
+++ b/output/userslist.html
@@ -183,7 +183,7 @@ module. Some examples:</p>

<!-- FOOTER -->
<div id="footer">
- <p>Copyright &copy; 1997-2023 The Apache Software Foundation.<br />
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
</div>
</div>
(httpd-site) branch asf-site updated: Automatic Site Publish by Buildbot [ In reply to ]
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/httpd-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
new 4d08562 Automatic Site Publish by Buildbot
4d08562 is described below

commit 4d08562c176bbfe8b40e2aea68c51d4c8a8a5eea
Author: buildbot <users@infra.apache.org>
AuthorDate: Thu Apr 4 15:44:58 2024 +0000

Automatic Site Publish by Buildbot
---
output/security/json/CVE-2023-38709.json | 187 +++--
output/security/vulnerabilities-httpd.json | 51 +-
output/security/vulnerabilities_24.html | 1167 ++++++++++++++++++++++++++++
3 files changed, 1279 insertions(+), 126 deletions(-)

diff --git a/output/security/json/CVE-2023-38709.json b/output/security/json/CVE-2023-38709.json
index 81141c3..5315daf 100644
--- a/output/security/json/CVE-2023-38709.json
+++ b/output/security/json/CVE-2023-38709.json
@@ -1,101 +1,94 @@
{
- "containers": {
- "cna": {
- "affected": [.
- {
- "defaultStatus": "unaffected",
- "product": "Apache HTTP Server",
- "vendor": "Apache Software Foundation",
- "versions": [.
- {
- "lessThanOrEqual": "2.4.58",
- "status": "affected",
- "version": "0",
- "versionType": "semver"
+ "containers": {
+ "cna": {
+ "affected": [.
+ {
+ "defaultStatus": "unaffected",
+ "product": "Apache HTTP Server",
+ "vendor": "Apache Software Foundation",
+ "versions": [.
+ {
+ "lessThanOrEqual": "2.4.58",
+ "status": "affected",
+ "version": "0",
+ "versionType": "semver"
+ }
+ ]
+ }
+ ],
+ "credits": [.
+ {
+ "lang": "en",
+ "type": "finder",
+ "value": "Orange Tsai (@orange_8361) from DEVCORE"
+ }
+ ],
+ "descriptions": [.
+ {
+ "lang": "en",
+ "supportingMedia": [.
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.<br><br>This issue affects Apache HTTP Server: through 2.4.58.<br>"
+ }
+ ],
+ "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
+ }
+ ],
+ "metrics": [.
+ {
+ "other": {
+ "content": {
+ "text": "moderate"
+ },
+ "type": "Textual description of severity"
+ }
+ }
+ ],
+ "problemTypes": [.
+ {
+ "descriptions": [.
+ {
+ "description": "HTTP response splitting",
+ "lang": "en"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
+ },
+ "references": [
+ {
+ "tags": [
+ "vendor-advisory"
+ ],
+ "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
+ }
+ ],
+ "source": {
+ "discovery": "EXTERNAL"
+ },
+ "timeline": [.
+ {
+ "lang": "en",
+ "time": "2023-06-26T00:00:00.000Z",
+ "value": "reported"
+ }
+ ],
+ "title": "Apache HTTP Server: HTTP response splitting",
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
}
- ]
}
- ],
- "credits": [.
- {
- "lang": "en",
- "type": "finder",
- "value": "Orange Tsai (@orange_8361) from DEVCORE"
- }
- ],
- "descriptions": [.
- {
- "lang": "en",
- "supportingMedia": [.
- {
- "base64": false,
- "type": "text/html",
- "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.<br><br>This issue affects Apache HTTP Server: through 2.4.58.<br>"
- }
- ],
- "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
- }
- ],
- "metrics": [.
- {
- "cvssV3_1": {
- "attackComplexity": "HIGH",
- "attackVector": "NETWORK",
- "availabilityImpact": "NONE",
- "baseScore": 6.8,
- "baseSeverity": "MEDIUM",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
- "privilegesRequired": "NONE",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
- "version": "3.1"
- },
- "format": "CVSS",
- "scenarios": [.
- {
- "lang": "en",
- "value": "GENERAL"
- }
- ]
- }
- ],
- "problemTypes": [.
- {
- "descriptions": [.
- {
- "description": "HTTP response splitting",
- "lang": "en"
- }
- ]
- }
- ],
- "providerMetadata": {
- "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
- },
- "source": {
- "discovery": "EXTERNAL"
- },
- "title": "Apache HTTP Server: HTTP response splitting",
- "x_generator": {
- "engine": "Vulnogram 0.1.0-dev"
- },
- "timeline": [.
- {
- "lang": "eng",
- "time": "2024-04-04",
- "value": "2.4.59 released"
- }
- ]
- }
- },
- "cveMetadata": {
- "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
- "cveId": "CVE-2023-38709",
- "serial": 1,
- "state": "PUBLISHED"
- },
- "dataType": "CVE_RECORD",
- "dataVersion": "5.0"
+ },
+ "cveMetadata": {
+ "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
+ "cveId": "CVE-2023-38709",
+ "serial": 1,
+ "state": "PUBLISHED"
+ },
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.0"
}
diff --git a/output/security/vulnerabilities-httpd.json b/output/security/vulnerabilities-httpd.json
index 7a12819..1930506 100644
--- a/output/security/vulnerabilities-httpd.json
+++ b/output/security/vulnerabilities-httpd.json
@@ -5201,27 +5201,12 @@
],
"metrics": [.
{
- "cvssV3_1": {
- "attackComplexity": "HIGH",
- "attackVector": "NETWORK",
- "availabilityImpact": "NONE",
- "baseScore": 6.8,
- "baseSeverity": "MEDIUM",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "NONE",
- "privilegesRequired": "NONE",
- "scope": "CHANGED",
- "userInteraction": "NONE",
- "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
- "version": "3.1"
- },
- "format": "CVSS",
- "scenarios": [.
- {
- "lang": "en",
- "value": "GENERAL"
- }
- ]
+ "other": {
+ "content": {
+ "text": "moderate"
+ },
+ "type": "Textual description of severity"
+ }
}
],
"problemTypes": [.
@@ -5237,20 +5222,28 @@
"providerMetadata": {
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
},
+ "references": [
+ {
+ "tags": [
+ "vendor-advisory"
+ ],
+ "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
+ }
+ ],
"source": {
"discovery": "EXTERNAL"
},
- "title": "Apache HTTP Server: HTTP response splitting",
- "x_generator": {
- "engine": "Vulnogram 0.1.0-dev"
- },
"timeline": [.
{
- "lang": "eng",
- "time": "2024-04-04",
- "value": "2.4.59 released"
+ "lang": "en",
+ "time": "2023-06-26T00:00:00.000Z",
+ "value": "reported"
}
- ]
+ ],
+ "title": "Apache HTTP Server: HTTP response splitting",
+ "x_generator": {
+ "engine": "Vulnogram 0.1.0-dev"
+ }
}
},
"cveMetadata": {
diff --git a/output/security/vulnerabilities_24.html b/output/security/vulnerabilities_24.html
new file mode 100644
index 0000000..8563927
--- /dev/null
+++ b/output/security/vulnerabilities_24.html
@@ -0,0 +1,1167 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+ <head>
+ <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
+ <link href="/css/apsite.css" rel="stylesheet" media="all" type="text/css" title="Main stylesheet" />
+ <meta name="author" content="Documentation Group" /><meta name="email" content="docs@httpd.apache.org" />
+ <title>Apache HTTP Server 2.4 vulnerabilities - The Apache HTTP Server Project</title>
+ <style>
+.headerlink {
+ visibility: hidden;
+}
+h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover > .headerlink, h5:hover > .headerlink, h6:hover > .headerlink, li:hover > .headerlink {
+ visibility: visible
+}
+ </style>
+ </head>
+ <body>
+ <div id="page-header">
+ <p class="menu">&nbsp;</p>
+ <p class="apache">&nbsp;</p>
+ <a href="/">
+ <img alt="" width="800" height="72" src="/images/httpd_logo_wide_new.png" />
+ </a>
+ <a class="badge" href="https://www.apache.org/foundation/contributing.html">
+ <img src="https://www.apache.org/images/SupportApache-small.png">
+ </a>
+ </div>
+ <div id="apmenu">
+ <script type="text/javascript" src="https://www.apachecon.com/event-images/snippet.js"></script>
+ <p style="margin-top: -10px;">
+ <!-- Apachecon! -->
+ <a class="acevent" data-format="wide" data-mode="light" data-width="160"></a>
+ </p>
+ <h1 id="essentials">Essentials<a class="headerlink" href="#essentials" title="Permanent link">&para;</a></h1>
+ <ul>
+ <li><a href="/download.cgi">Download!</a></li>
+ <li><a href="/ABOUT_APACHE.html">About</a></li>
+ <li><a href="https://www.apache.org/licenses/">License</a></li>
+ <li><a href="https://wiki.apache.org/httpd/FAQ">FAQ</a></li>
+ <li><a href="/security_report.html">Security Reports</a></li>
+ </ul>
+ <h1 id="source-repositories">Source Repositories<a class="headerlink" href="#source-repositories" title="Permanent link">&para;</a></h1>
+ <ul>
+ <li><a href="/dev/devnotes.html">General Information</a></li>
+ <li><a href="https://svn.apache.org/viewvc/httpd/httpd/trunk/">Trunk</a></li>
+ <li><a href="https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/">2.4</a></li>
+ </ul>
+ <h1 id="documentation"><a href="/docs/">Documentation</a><a class="headerlink" href="#documentation" title="Permanent link">&para;</a></h1>
+ <ul>
+ <li><a href="/docs/2.4/">Version 2.4</a></li>
+ <li><a href="/docs/trunk/">Trunk (dev)</a></li>
+ <li><a href="https://wiki.apache.org/httpd/">Wiki</a></li>
+ </ul>
+ <h1 id="get-involved"><a href="/contribute/">Get Involved</a><a class="headerlink" href="#get-involved" title="Permanent link">&para;</a></h1>
+ <ul>
+ <li><a href="/lists.html">Mailing Lists</a></li>
+ <li><a href="/bug_report.html">Bug Reports</a></li>
+ <li><a href="/dev/">Developer Info</a></li>
+ <li><a href="/support.html">User Support</a></li>
+ </ul>
+ <h1 id="subprojects">Subprojects<a class="headerlink" href="#subprojects" title="Permanent link">&para;</a></h1>
+ <ul>
+ <li><a href="/docs-project/">Docs</a></li>
+ <li><a href="/test/">Test</a></li>
+ <li><a href="/test/flood/">Flood</a></li>
+ <li><a href="/apreq/">libapreq</a></li>
+ <li><a href="/modules">Modules</a></li>
+ <li><a href="/mod_fcgid/">mod_fcgid</a></li>
+ <li><a href="/mod_ftp/">mod_ftp</a></li>
+ </ul>
+ <h1 id="related-projects">Related Projects<a class="headerlink" href="#related-projects" title="Permanent link">&para;</a></h1>
+ <ul>
+ <li><a href="https://trafficserver.apache.org/">Apache Traffic Server</a></li>
+ <li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
+ <li><a href="https://tomcat.apache.org/">Tomcat</a></li>
+ <li><a href="https://apr.apache.org/">APR</a></li>
+ <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ </ul>
+ <h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
+ <ul>
+ <li><a href="/contributors/">Contributors</a></li>
+ <li><a href="https://www.apache.org/foundation/thanks.html">Thanks!</a></li>
+ <li><a href="https://www.apache.org/foundation/sponsorship.html">Sponsorship</a></li>
+ </ul>
+ </div>
+ <!-- RIGHT SIDE INFORMATION -->
+ <div id="apcontents">
+ <h1>Apache HTTP Server 2.4 vulnerabilities</h1>
+<p>This page lists all security vulnerabilities fixed in released versions of Apache HTTP Server 2.4. Each vulnerability is given a security <a href="/security/impact_levels.html">impact rating</a> by the Apache security team - please note that this rating may well vary from platform to platform. We also list the versions the flaw is known to affect, and where a flaw has not been verified list the version with a question mark.</p>
+<p>Please note that if a vulnerability is shown below as being fixed in a "-dev" release then this means that a fix has been applied to the development source tree and will be part of an upcoming full release.</p>
+<p>Please send comments or corrections for these vulnerabilities to the <a href="/security_report.html">Security Team</a>.</p> <br/>
+<p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases. Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><br/>
+<h1 id="2.4.59">Fixed in Apache HTTP Server 2.4.59</h1><dl>
+<dt><h3 id="CVE-2024-24795">low: <name name="CVE-2024-24795">Apache HTTP Server: HTTP Response Splitting in multiple modules</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2024-24795">CVE-2024-24795</a>)</h3></dt>
+<dd><p>HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.</p><p></p><p>Users are recommended to upgrade to version 2.4.59, which fixes this issue.</p>
+<p>Acknowledgements:</p>
+<ul>
+<li>finder: Keran Mu, Tsinghua University and Zhongguancun Laboratory.</li>
+<li>finder: Jianjun Chen, Tsinghua University and Zhongguancun Laboratory.</li>
+</ul>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-09-06</td></tr>
+<tr><td class="cve-header">Update 2.4.59 released</td><td class="cve-value">2024-04-04</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.58</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2024-27316">moderate: <name name="CVE-2024-27316">Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2024-27316">CVE-2024-27316</a>)</h3></dt>
+<dd><p>HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.</p>
+<p>Acknowledgements: finder: Bartek Nowotarski (https://nowotarski.info/) </p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2024-02-22</td></tr>
+<tr><td class="cve-header">Update 2.4.59 released</td><td class="cve-value">2024-04-04</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.58</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.58">Fixed in Apache HTTP Server 2.4.58</h1><dl>
+<dt><h3 id="CVE-2023-31122">low: <name name="CVE-2023-31122">mod_macro buffer over-read</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2023-31122">CVE-2023-31122</a>)</h3></dt>
+<dd><p>Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.</p><p></p><p></p>
+<p>Acknowledgements: finder: David Shoon (github/davidshoon)</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.58 released</td><td class="cve-value">2023-10-19</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.57</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2023-43622">low: <name name="CVE-2023-43622">Apache HTTP Server: DoS in HTTP/2 with initial windows size 0</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2023-43622">CVE-2023-43622</a>)</h3></dt>
+<dd><p>An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern.</p><p>This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.</p><p></p><p>This issue affects Apache HTTP Server: from 2.4.55 through 2.4.5 [...]
+<p>Acknowledgements:</p>
+<ul>
+<li>finder: Prof. Sven Dietrich (City University of New York)</li>
+<li>finder: Isa Jafarov (City University of New York)</li>
+<li>finder: Prof. Heejo Lee (Korea University)</li>
+<li>finder: Choongin Lee (Korea University)</li>
+</ul>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-09-15</td></tr>
+<tr><td class="cve-header">Update 2.4.58 released</td><td class="cve-value">2023-10-19</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.57</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2023-45802">moderate: <name name="CVE-2023-45802">Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2023-45802">CVE-2023-45802</a>)</h3></dt>
+<dd><p>When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.</p><p></p><p>This was found by the report [...]
+<p>Acknowledgements:</p>
+<ul>
+<li>finder: Will Dormann of Vul Labs</li>
+<li>finder: David Warren of Vul Labs</li>
+</ul>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-10-12</td></tr>
+<tr><td class="cve-header">Update 2.4.58 released</td><td class="cve-value">2023-10-19</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.57</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.56">Fixed in Apache HTTP Server 2.4.56</h1><dl>
+<dt><h3 id="CVE-2023-25690">important: <name name="CVE-2023-25690">HTTP request splitting with mod_rewrite and mod_proxy</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2023-25690">CVE-2023-25690</a>)</h3></dt>
+<dd><p>Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.</p><p></p><p></p><p></p><p></p><p>Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.</p><p></p><p> For example, something [...]
+<p>Acknowledgements: finder: Lars Krapf of Adobe</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-02-02</td></tr>
+<tr><td class="cve-header">fixed by r1908095 in 2.4.x</td><td class="cve-value">2023-03-07</td></tr>
+<tr><td class="cve-header">Update 2.4.56 released</td><td class="cve-value">2023-03-07</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.55</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2023-27522">moderate: <name name="CVE-2023-27522">Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2023-27522">CVE-2023-27522</a>)</h3></dt>
+<dd><p>HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.</p><p></p><p>Special characters in the origin response header can truncate/split the response forwarded to the client.</p><p></p><p></p><p></p>
+<p>Acknowledgements: finder: Dimas Fariski Setyawan Putra (nyxsorcerer)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-01-29</td></tr>
+<tr><td class="cve-header">fixed by r1908094 in 2.4.x</td><td class="cve-value">2023-03-07</td></tr>
+<tr><td class="cve-header">Update 2.4.56 released</td><td class="cve-value">2023-03-07</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.55</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.55">Fixed in Apache HTTP Server 2.4.55</h1><dl>
+<dt><h3 id="CVE-2006-20001">moderate: <name name="CVE-2006-20001">mod_dav out of bounds read, or write of zero byte</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2006-20001">CVE-2006-20001</a>)</h3></dt>
+<dd><p>A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.</p><p></p><p>This issue affects Apache HTTP Server 2.4.54 and earlier.</p><p></p>
+<table class="table"><tr><td class="cve-header">Described in first edition of "The Art of Software Security Assessment"</td><td class="cve-value">2006-10-31</td></tr>
+<tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-08-10</td></tr>
+<tr><td class="cve-header">Update 2.4.55 released</td><td class="cve-value">2023-01-17</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.54</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-36760">moderate: <name name="CVE-2022-36760">Apache HTTP Server: mod_proxy_ajp Possible request smuggling</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-36760">CVE-2022-36760</a>)</h3></dt>
+<dd><p>Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.</p>
+<p>Acknowledgements: finder: ZeddYu_Lu from Qi'anxin Research Institute of Legendsec at Qi'anxin Group</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-07-12</td></tr>
+<tr><td class="cve-header">Update 2.4.55 released</td><td class="cve-value">2023-01-17</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.54</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-37436">moderate: <name name="CVE-2022-37436">Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-37436">CVE-2022-37436</a>)</h3></dt>
+<dd><p>Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.</p>
+<p>Acknowledgements: finder: Dimas Fariski Setyawan Putra (@nyxsorcerer)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-07-14</td></tr>
+<tr><td class="cve-header">Update 2.4.55 released</td><td class="cve-value">2023-01-17</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;2.4.55</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.54">Fixed in Apache HTTP Server 2.4.54</h1><dl>
+<dt><h3 id="CVE-2022-26377">moderate: <name name="CVE-2022-26377">mod_proxy_ajp: Possible request smuggling</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-26377">CVE-2022-26377</a>)</h3></dt>
+<dd><p>Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.</p>
+<p>Acknowledgements: Ricter Z @ 360 Noah Lab</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-03-02</td></tr>
+<tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-28330">low: <name name="CVE-2022-28330">read beyond bounds in mod_isapi</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-28330">CVE-2022-28330</a>)</h3></dt>
+<dd><p>Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module. </p>
+<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-28614">low: <name name="CVE-2022-28614">read beyond bounds via ap_rwrite() </name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-28614">CVE-2022-28614</a>)</h3></dt>
+<dd><p>The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.</p><p></p><p>Modules compiled and distributed separately from Apache HTTP Server that use the "ap_rputs" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.</p>
+<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
+<table class="table"><tr><td class="cve-header">Update released in 2.4.54</td><td class="cve-value">2022-06-08</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-28615">low: <name name="CVE-2022-28615">Read beyond bounds in ap_strcmp_match()</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-28615">CVE-2022-28615</a>)</h3></dt>
+<dd><p>Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.</p>
+<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-29404">low: <name name="CVE-2022-29404">Denial of service in mod_lua r:parsebody</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-29404">CVE-2022-29404</a>)</h3></dt>
+<dd><p>In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.</p>
+<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-30522">low: <name name="CVE-2022-30522">mod_sed denial of service</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-30522">CVE-2022-30522</a>)</h3></dt>
+<dd><p>If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.</p>
+<p>Acknowledgements: This issue was found by Brian Moussalli from the JFrog Security Research team</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.53</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-30556">low: <name name="CVE-2022-30556">Information Disclosure in mod_lua with websockets</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-30556">CVE-2022-30556</a>)</h3></dt>
+<dd><p>Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.</p>
+<p>Acknowledgements: The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) for reporting this issue</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-31813">low: <name name="CVE-2022-31813">mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-31813">CVE-2022-31813</a>)</h3></dt>
+<dd><p>Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism.</p><p>This may be used to bypass IP based authentication on the origin server/application.</p>
+<p>Acknowledgements: The Apache HTTP Server project would like to thank Gaetan Ferry (Synacktiv) for reporting this issue</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.54 released</td><td class="cve-value">2022-06-08</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.53</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.53">Fixed in Apache HTTP Server 2.4.53</h1><dl>
+<dt><h3 id="CVE-2022-22719">moderate: <name name="CVE-2022-22719">mod_lua Use of uninitialized value of in r:parsebody</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-22719">CVE-2022-22719</a>)</h3></dt>
+<dd><p>A carefully crafted request body can cause a read to a random memory area which could cause the process to crash.</p><p></p><p>This issue affects Apache HTTP Server 2.4.52 and earlier.</p>
+<p>Acknowledgements: Chamal De Silva</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-12-18</td></tr>
+<tr><td class="cve-header">fixed by r1898694 in 2.4.x</td><td class="cve-value">2022-03-07</td></tr>
+<tr><td class="cve-header">Update 2.4.53 released</td><td class="cve-value">2022-03-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.52</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-22720">important: <name name="CVE-2022-22720">HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-22720">CVE-2022-22720</a>)</h3></dt>
+<dd><p>Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling</p>
+<p>Acknowledgements: James Kettle &lt;james.kettle portswigger.net&gt;</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-12-17</td></tr>
+<tr><td class="cve-header">fixed by r1898692 in 2.4.x</td><td class="cve-value">2022-03-07</td></tr>
+<tr><td class="cve-header">Update 2.4.53 released</td><td class="cve-value">2022-03-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.52</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-22721">low: <name name="CVE-2022-22721">core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-22721">CVE-2022-22721</a>)</h3></dt>
+<dd><p>If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes.</p><p></p><p>This issue affects Apache HTTP Server 2.4.52 and earlier.</p>
+<p>Acknowledgements: Anonymous working with Trend Micro Zero Day Initiative</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-12-16</td></tr>
+<tr><td class="cve-header">fixed by r1898693 in 2.4.x</td><td class="cve-value">2022-03-07</td></tr>
+<tr><td class="cve-header">Update 2.4.53 released</td><td class="cve-value">2022-03-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.52</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2022-23943">important: <name name="CVE-2022-23943">mod_sed: Read/write beyond bounds</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2022-23943">CVE-2022-23943</a>)</h3></dt>
+<dd><p>Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data.</p><p></p><p>This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.</p>
+<p>Acknowledgements: Ronald Crane (Zippenhop LLC)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2022-01-13</td></tr>
+<tr><td class="cve-header">fixed by r1898695, r1898772 in 2.4.x</td><td class="cve-value">2022-03-09</td></tr>
+<tr><td class="cve-header">Update 2.4.53 released</td><td class="cve-value">2022-03-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.52</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.52">Fixed in Apache HTTP Server 2.4.52</h1><dl>
+<dt><h3 id="CVE-2021-44224">moderate: <name name="CVE-2021-44224">Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-44224">CVE-2021-44224</a>)</h3></dt>
+<dd><p>A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery).</p><p></p><p>This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).</p>
+<p>Acknowledgements:</p>
+<ul>
+<li>???</li>
+<li>TengMA(@Te3t123)</li>
+</ul>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-11-18</td></tr>
+<tr><td class="cve-header">fixed by r1895955, r1896044 in 2.4.x</td><td class="cve-value">2021-12-14</td></tr>
+<tr><td class="cve-header">Update 2.4.52 released</td><td class="cve-value">2021-12-20</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&gt;=2.4.7, &lt;=2.4.51</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-44790">important: <name name="CVE-2021-44790">Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-44790">CVE-2021-44790</a>)</h3></dt>
+<dd><p>A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts).</p><p>The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one.</p><p></p><p>This issue affects Apache HTTP Server 2.4.51 and earlier.</p>
+<p>Acknowledgements: Chamal</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-12-07</td></tr>
+<tr><td class="cve-header">Fixed by r1896039 in 2.4.x</td><td class="cve-value">2021-12-16</td></tr>
+<tr><td class="cve-header">Update 2.4.52 released</td><td class="cve-value">2021-12-20</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.51</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.51">Fixed in Apache HTTP Server 2.4.51</h1><dl>
+<dt><h3 id="CVE-2021-42013">critical: <name name="CVE-2021-42013">Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-42013">CVE-2021-42013</a>)</h3></dt>
+<dd><p>It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. </p><p></p><p>If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution.</p><p> [...]
+<p>Acknowledgements:</p>
+<ul>
+<li>Reported by Juan Escobar from Dreamlab Technologies</li>
+<li>Reported by Fernando Mu&ntilde;oz from NULL Life CTF Team</li>
+<li>Reported by Shungo Kumasaka</li>
+<li>Reported by Nattapon Jongcharoen</li>
+</ul>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-10-06</td></tr>
+<tr><td class="cve-header">fixed by r1893977, r1893980, r1893982 in 2.4.x</td><td class="cve-value">2021-10-07</td></tr>
+<tr><td class="cve-header">Update 2.4.51 released</td><td class="cve-value">2021-10-07</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.50, 2.4.49</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.50">Fixed in Apache HTTP Server 2.4.50</h1><dl>
+<dt><h3 id="CVE-2021-41524">moderate: <name name="CVE-2021-41524">null pointer dereference in h2 fuzzing</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-41524">CVE-2021-41524</a>)</h3></dt>
+<dd><p>While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing,</p><p>allowing an external source to DoS the server. This requires a specially crafted request. </p><p></p><p>The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.</p>
+<p>Acknowledgements: Apache httpd team would like to thank LI ZHI XIN from NSFocus Security Team for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-09-17</td></tr>
+<tr><td class="cve-header">fixed by r1893655 in 2.4.x</td><td class="cve-value">2021-09-26</td></tr>
+<tr><td class="cve-header">Update 2.4.50 released</td><td class="cve-value">2021-10-04</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.49</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-41773">critical: <name name="CVE-2021-41773">Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-41773">CVE-2021-41773</a>)</h3></dt>
+<dd><p>A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives.</p><p></p><p>If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution.</p><p></p><p>Th [...]
+<p>Acknowledgements: This issue was reported by Ash Daulton along with the cPanel Security Team</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-09-29</td></tr>
+<tr><td class="cve-header">fixed by r1893775 in 2.4.x</td><td class="cve-value">2021-10-01</td></tr>
+<tr><td class="cve-header">Update 2.4.50 released</td><td class="cve-value">2021-10-04</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.49</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.49">Fixed in Apache HTTP Server 2.4.49</h1><dl>
+<dt><h3 id="CVE-2021-33193">moderate: <name name="CVE-2021-33193">Request splitting via HTTP/2 method injection and mod_proxy</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-33193">CVE-2021-33193</a>)</h3></dt>
+<dd><p>A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning.</p><p></p><p>This issue affects Apache HTTP Server 2.4.17 to 2.4.48.</p>
+<p>Acknowledgements: Reported by James Kettle of PortSwigger</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-05-11</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-08-06</td></tr>
+<tr><td class="cve-header">Update 2.4.49 released</td><td class="cve-value">2021-09-16</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48, !&lt;2.4.17</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-34798">moderate: <name name="CVE-2021-34798">NULL pointer dereference in httpd core</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-34798">CVE-2021-34798</a>)</h3></dt>
+<dd><p>Malformed requests may cause the server to dereference a NULL pointer.</p><p></p><p></p><p>This issue affects Apache HTTP Server 2.4.48 and earlier.</p>
+<p>Acknowledgements: The issue was discovered by the Apache HTTP security team</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.49 released</td><td class="cve-value">2021-09-16</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-36160">moderate: <name name="CVE-2021-36160">mod_proxy_uwsgi out of bound read</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-36160">CVE-2021-36160</a>)</h3></dt>
+<dd><p>A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS).</p><p></p><p>This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).</p>
+<p>Acknowledgements: LI ZHI XIN from NSFocus Security Team</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-04-26</td></tr>
+<tr><td class="cve-header">Update 2.4.49 release</td><td class="cve-value">2021-09-16</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48, !&lt;2.4.30</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-39275">low: <name name="CVE-2021-39275">ap_escape_quotes buffer overflow</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-39275">CVE-2021-39275</a>)</h3></dt>
+<dd><p>ap_escape_quotes() may write beyond the end of a buffer when given malicious input. </p><p>No included modules pass untrusted data to these functions, but third-party / external modules may.</p><p></p><p>This issue affects Apache HTTP Server 2.4.48 and earlier.</p>
+<p>Acknowledgements: ClusterFuzz</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.49 released</td><td class="cve-value">2021-09-16</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-40438">important: <name name="CVE-2021-40438">mod_proxy SSRF</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-40438">CVE-2021-40438</a>)</h3></dt>
+<dd><p>A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user.</p><p></p><p>This issue affects Apache HTTP Server 2.4.48 and earlier.</p>
+<p>Acknowledgements: The issue was discovered by the Apache HTTP security team while analysing CVE-2021-36160</p>
+<table class="table"><tr><td class="cve-header">Update 2.4.49 released</td><td class="cve-value">2021-09-16</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.48</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.48">Fixed in Apache HTTP Server 2.4.48</h1><dl>
+<dt><h3 id="CVE-2019-17567">moderate: <name name="CVE-2019-17567">mod_proxy_wstunnel tunneling of non Upgraded connections</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-17567">CVE-2019-17567</a>)</h3></dt>
+<dd><p>Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.</p>
+<p>Acknowledgements: Reported by Mikhail Egorov (&lt;0ang3el gmail.com&gt;)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-10-05</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2020-13938">moderate: <name name="CVE-2020-13938">Improper Handling of Insufficient Privileges</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-13938">CVE-2020-13938</a>)</h3></dt>
+<dd><p>Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows</p>
+<p>Acknowledgements: Discovered by Ivan Zhakov</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-01-26</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2020-13950">low: <name name="CVE-2020-13950">mod_proxy_http NULL pointer dereference</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-13950">CVE-2020-13950</a>)</h3></dt>
+<dd><p>Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted requests using both Content-Length and Transfer-Encoding headers, leading to a Denial of Service</p>
+<p>Acknowledgements: Reported by Marc Stern (&lt;marc.stern approach.be&gt;)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-09-11</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2020-35452">low: <name name="CVE-2020-35452">mod_auth_digest possible stack overflow by one nul byte</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-35452">CVE-2020-35452</a>)</h3></dt>
+<dd><p>Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow</p>
+<p>Acknowledgements: This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-11-11</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-26690">low: <name name="CVE-2021-26690">mod_session NULL pointer dereference</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-26690">CVE-2021-26690</a>)</h3></dt>
+<dd><p>Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service</p>
+<p>Acknowledgements: This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-02-08</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-26691">low: <name name="CVE-2021-26691">mod_session response handling heap overflow</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-26691">CVE-2021-26691</a>)</h3></dt>
+<dd><p>Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted SessionHeader sent by an origin server could cause a heap overflow</p>
+<p>Acknowledgements: Discovered internally Christophe Jaillet</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-03-01</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-30641">moderate: <name name="CVE-2021-30641">Unexpected URL matching with 'MergeSlashes OFF'</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-30641">CVE-2021-30641</a>)</h3></dt>
+<dd><p>Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'</p>
+<p>Acknowledgements: Discovered by Christoph Anton Mitterer</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-04-14</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.46, 2.4.43, 2.4.41, 2.4.39</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2021-31618">important: <name name="CVE-2021-31618">NULL pointer dereference on specially crafted HTTP/2 request</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2021-31618">CVE-2021-31618</a>)</h3></dt>
+<dd><p>Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected.</p><p></p><p>This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appea [...]
+<p>Acknowledgements: Apache HTTP server would like to thank LI ZHI XIN from NSFoucs for reporting this.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2021-04-22</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Update 2.4.48 released</td><td class="cve-value">2021-06-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.47</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.44">Fixed in Apache HTTP Server 2.4.44</h1><dl>
+<dt><h3 id="CVE-2020-9490">important: <name name="CVE-2020-9490">Push Diary Crash on Specifically Crafted HTTP/2 Header</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-9490">CVE-2020-9490</a>)</h3></dt>
+<dd><p>In Apache HTTP Server versions 2.4.20 to 2.4.43, a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.</p>
+<p>Acknowledgements: Felix Wilhelm of Google Project Zero</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-04-24</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
+<tr><td class="cve-header">Update 2.4.44 released</td><td class="cve-value">2020-08-07</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.43, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2020-11984">moderate: <name name="CVE-2020-11984">mod_proxy_uwsgi buffer overflow</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-11984">CVE-2020-11984</a>)</h3></dt>
+<dd><p>In Apache HTTP Server versions 2.4.32 to 2.4.43, mod_proxy_uwsgi has a information disclosure and possible RCE</p>
+<p>Acknowledgements: Discovered by Felix Wilhelm of Google Project Zero</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-07-22</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
+<tr><td class="cve-header">Update 2.4.44 released</td><td class="cve-value">2020-08-07</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2020-11993">moderate: <name name="CVE-2020-11993">Push Diary Crash on Specifically Crafted HTTP/2 Header</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-11993">CVE-2020-11993</a>)</h3></dt>
+<dd><p>In Apache HTTP Server versions 2.4.20 to 2.4.43, when trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools.</p><p>Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.</p>
+<p>Acknowledgements: Felix Wilhelm of Google Project Zero</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-06-16</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
+<tr><td class="cve-header">Update 2.4.44 released</td><td class="cve-value">2020-08-07</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.43, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.42">Fixed in Apache HTTP Server 2.4.42</h1><dl>
+<dt><h3 id="CVE-2020-1927">low: <name name="CVE-2020-1927">mod_rewrite CWE-601 open redirect</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-1927">CVE-2020-1927</a>)</h3></dt>
+<dd><p>In Apache HTTP Server versions 2.4.0 to 2.4.41 some mod_rewrite configurations vulnerable to open redirect.</p>
+<p>Acknowledgements: The issue was discovered by Fabrice Perez</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-12-05</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-04-01</td></tr>
+<tr><td class="cve-header">Update 2.4.42 released</td><td class="cve-value">2020-04-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.41, 2.4.40, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2020-1934">low: <name name="CVE-2020-1934">mod_proxy_ftp use of uninitialized value</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-1934">CVE-2020-1934</a>)</h3></dt>
+<dd><p>in Apache HTTP Server versions 2.4.0 to 2.4.41, mod_proxy_ftp use of uninitialized value with malicious FTP backend.</p>
+<p>Acknowledgements: The issue was discovered by Chamal De Silva</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2020-01-03</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-04-01</td></tr>
+<tr><td class="cve-header">Update 2.4.42 released</td><td class="cve-value">2020-04-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.41, 2.4.40, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.41">Fixed in Apache HTTP Server 2.4.41</h1><dl>
+<dt><h3 id="CVE-2019-9517">moderate: <name name="CVE-2019-9517">mod_http2, DoS attack by exhausting h2 workers.</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-9517">CVE-2019-9517</a>)</h3></dt>
+<dd><p>A malicious client could perform a DoS attack by flooding a connection with requests and basically never reading responses on the TCP connection. Depending on h2 worker dimensioning, it was possible to block those with relatively few connections.</p>
+<p>Acknowledgements: The issue was discovered by Jonathan Looney of Netflix.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-04-10</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.32, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-10081">moderate: <name name="CVE-2019-10081">mod_http2, memory corruption on early pushes</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10081">CVE-2019-10081</a>)</h3></dt>
+<dd><p>HTTP/2 very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.</p>
+<p>Acknowledgements: The issue was discovered by Craig Young of Tripwire VERT, &lt;vuln-report@secur3.us&gt;.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-04-10</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.32, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-10082">moderate: <name name="CVE-2019-10082">mod_http2, read-after-free in h2 connection shutdown</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10082">CVE-2019-10082</a>)</h3></dt>
+<dd><p>Using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.</p>
+<p>Acknowledgements: The issue was discovered by Craig Young of Tripwire VERT, &lt;vuln-report@secur3.us&gt;.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-04-12</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.32, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-10092">low: <name name="CVE-2019-10092">Limited cross-site scripting in mod_proxy error page</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10092">CVE-2019-10092</a>)</h3></dt>
+<dd><p>A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malfomed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. We have taken this opportunity to also remove request data from many other in-built error messages. Note however this issue did not [...]
+<p>Acknowledgements: This issue was reported by Matei "Mal" Badanoiu</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-07-09</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-10097">moderate: <name name="CVE-2019-10097">CVE-2019-10097 mod_remoteip: Stack buffer overflow and NULL pointer dereference</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10097">CVE-2019-10097</a>)</h3></dt>
+<dd><p>When mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.</p>
+<p>Acknowledgements: The issue was discovered by Daniel McCarney &lt;cpu@letsencrypt.org&gt; Let's Encrypt / Internet Security Research Group (ISRG)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-07-23</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-10098">low: <name name="CVE-2019-10098">mod_rewrite potential open redirect</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-10098">CVE-2019-10098</a>)</h3></dt>
+<dd><p>Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.</p>
+<p>Acknowledgements: The issue was discovered by Yukitsugu Sasaki</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-03-26</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Update 2.4.41 released</td><td class="cve-value">2019-08-14</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.39">Fixed in Apache HTTP Server 2.4.39</h1><dl>
+<dt><h3 id="CVE-2019-0196">low: <name name="CVE-2019-0196">mod_http2, read-after-free on a string compare</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0196">CVE-2019-0196</a>)</h3></dt>
+<dd><p>Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparision when determining the method of a request and thus process the request incorrectly.</p>
+<p>Acknowledgements: The issue was discovered by Craig Young, &lt;vuln-report@secur3.us&gt;.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-29</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-0197">low: <name name="CVE-2019-0197">mod_http2, possible crash on late upgrade</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0197">CVE-2019-0197</a>)</h3></dt>
+<dd><p>When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. A server that never enabled the h2 protocol or that only enabled it for https: and did not configure the "H2Upgrade on" is unaffected by this.</p>
+<p>Acknowledgements: The issue was discovered by Stefan Eissing, greenbytes.de.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-29</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-0211">important: <name name="CVE-2019-0211">Apache HTTP Server privilege escalation from modules' scripts</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0211">CVE-2019-0211</a>)</h3></dt>
+<dd><p>In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.</p>
+<p>Acknowledgements: The issue was discovered by Charles Fol.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-02-22</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-0215">important: <name name="CVE-2019-0215">mod_ssl access control bypass</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0215">CVE-2019-0215</a>)</h3></dt>
+<dd><p>In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions.</p>
+<p>Acknowledgements: The issue was discovered by Michael Kaufmann.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-23</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-0217">important: <name name="CVE-2019-0217">mod_auth_digest access control bypass</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0217">CVE-2019-0217</a>)</h3></dt>
+<dd><p>In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.</p>
+<p>Acknowledgements: The issue was discovered by Simon Kappel.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-29</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-0220">low: <name name="CVE-2019-0220">Apache httpd URL normalization inconsistincy</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0220">CVE-2019-0220</a>)</h3></dt>
+<dd><p>When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.</p>
+<p>Acknowledgements: The issue was discovered by Bernhard Lorenz &lt;bernhard.lorenz@alphastrike.io&gt; of Alpha Strike Labs GmbH.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-20</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Update 2.4.39 released</td><td class="cve-value">2019-04-01</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.38">Fixed in Apache HTTP Server 2.4.38</h1><dl>
+<dt><h3 id="CVE-2018-17189">low: <name name="CVE-2018-17189">DoS for HTTP/2 connections via slow request bodies</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-17189">CVE-2018-17189</a>)</h3></dt>
+<dd><p>By sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.</p>
+<p>Acknowledgements: The issue was discovered by Gal Goldshtein of F5 Networks.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-10-16</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-01-22</td></tr>
+<tr><td class="cve-header">Update 2.4.38 released</td><td class="cve-value">2019-02-28</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2018-17199">low: <name name="CVE-2018-17199">mod_session_cookie does not respect expiry time</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-17199">CVE-2018-17199</a>)</h3></dt>
+<dd><p>In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.</p>
+<p>Acknowledgements: The issue was discovered by Diego Angulo from ImExHS.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-10-08</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-01-22</td></tr>
+<tr><td class="cve-header">Update 2.4.38 released</td><td class="cve-value">2019-02-28</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2019-0190">important: <name name="CVE-2019-0190">mod_ssl 2.4.37 remote DoS when used with OpenSSL 1.1.1</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2019-0190">CVE-2019-0190</a>)</h3></dt>
+<dd><p>A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts.</p>
+<p>Acknowledgements: The issue was discovered through user bug reports.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2019-01-01</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2019-01-22</td></tr>
+<tr><td class="cve-header">Update 2.4.38 released</td><td class="cve-value">2019-02-28</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.37</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.35">Fixed in Apache HTTP Server 2.4.35</h1><dl>
+<dt><h3 id="CVE-2018-11763">low: <name name="CVE-2018-11763">DoS for HTTP/2 connections by continuous SETTINGS</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-11763">CVE-2018-11763</a>)</h3></dt>
+<dd><p>By sending continous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol.</p>
+<p>Acknowledgements: The issue was discovered by Gal Goldshtein of F5 Networks.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-07-18</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-09-25</td></tr>
+<tr><td class="cve-header">Update 2.4.35 released</td><td class="cve-value">2018-09-29</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.34">Fixed in Apache HTTP Server 2.4.34</h1><dl>
+<dt><h3 id="CVE-2018-1333">low: <name name="CVE-2018-1333">DoS for HTTP/2 connections by crafted requests</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1333">CVE-2018-1333</a>)</h3></dt>
+<dd><p>By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. This issue only affects servers that have configured and enabled HTTP/2 support, which is not the default</p>
+<p>Acknowledgements: The issue was discovered by Craig Young of Tripwire VERT.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-05-08</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-07-18</td></tr>
+<tr><td class="cve-header">Update 2.4.34 released</td><td class="cve-value">2018-07-15</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.33, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2018-8011">moderate: <name name="CVE-2018-8011">mod_md, DoS via Coredumps on specially crafted requests</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-8011">CVE-2018-8011</a>)</h3></dt>
+<dd><p>By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server.</p>
+<p>Acknowledgements: The issue was discovered by Daniel Caminada &lt;daniel.caminada@ergon.ch&gt;.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-06-29</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-07-18</td></tr>
+<tr><td class="cve-header">Update 2.4.34 released</td><td class="cve-value">2018-07-15</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.33</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.33">Fixed in Apache HTTP Server 2.4.33</h1><dl>
+<dt><h3 id="CVE-2017-15710">low: <name name="CVE-2017-15710">Out of bound write in mod_authnz_ldap when using too small Accept-Language values</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-15710">CVE-2017-15710</a>)</h3></dt>
+<dd><p>mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory locati [...]
+<p>Acknowledgements: The Apache HTTP Server security team would like to thank Alex Nichols and Jakob Hirsch for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-12-07</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2017-15715">low: <name name="CVE-2017-15715">&lt;FilesMatch&gt; bypass with a trailing newline in the file name</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-15715">CVE-2017-15715</a>)</h3></dt>
+<dd><p>The expression specified in &lt;FilesMatch&gt; could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.</p>
+<p>Acknowledgements: The issue was discovered by Elar Lang - security.elarlang.eu</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-11-24</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2018-1283">moderate: <name name="CVE-2018-1283">Tampering of mod_session data for CGI applications</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1283">CVE-2018-1283</a>)</h3></dt>
+<dd><p>When mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. The severity is set to Moderate because "SessionEnv on" is not a default nor common con [...]
+<p>Acknowledgements: The issue was discovered internally by the Apache HTTP Server team.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-11-14</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2018-1301">low: <name name="CVE-2018-1301">Possible out of bound access after failure in reading the HTTP request</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1301">CVE-2018-1301</a>)</h3></dt>
+<dd><p>A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.33, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.</p>
+<p>Acknowledgements: The issue was discovered by Robert Swiecki, bug found by honggfuzz.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-01-23</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2018-1302">low: <name name="CVE-2018-1302">Possible write of after free on HTTP/2 stream shutdown</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1302">CVE-2018-1302</a>)</h3></dt>
+<dd><p>When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.33 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerabilty hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.</p>
+<p>Acknowledgements: The issue was discovered by Robert Swiecki, bug found by honggfuzz.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-01-23</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2018-1303">low: <name name="CVE-2018-1303">Possible out of bound read in mod_cache_socache</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1303">CVE-2018-1303</a>)</h3></dt>
+<dd><p>A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.33 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache.</p>
+<p>Acknowledgements: The issue was discovered by Robert Swiecki, bug found by honggfuzz.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2018-01-23</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2018-1312">low: <name name="CVE-2018-1312">Weak Digest auth nonce generation in mod_auth_digest</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2018-1312">CVE-2018-1312</a>)</h3></dt>
+<dd><p>When generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.</p>
+<p>Acknowledgements: The issue was discovered by Nicolas Daniels.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-03-05</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Update 2.4.33 released</td><td class="cve-value">2018-03-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.28">Fixed in Apache HTTP Server 2.4.28</h1><dl>
+<dt><h3 id="CVE-2017-9798">low: <name name="CVE-2017-9798">Use-after-free when using &lt;Limit &gt; with an unrecognized method in .htaccess ("OptionsBleed")</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-9798">CVE-2017-9798</a>)</h3></dt>
+<dd><p>When an unrecognized HTTP Method is given in an &lt;Limit {method}&gt; directive in an .htaccess file, and that .htaccess file is processed by the corresponding request, the global methods table is corrupted in the current worker process, resulting in erratic behaviour. This behavior may be avoided by listing all unusual HTTP Methods in a global httpd.conf RegisterHttpMethod directive in httpd release 2.4.25 and later. To permit other .htaccess directives while denying the &lt;Lim [...]
+<p>Acknowledgements: We would like to thank Hanno B&ouml;ck for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-07-12</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-09-18</td></tr>
+<tr><td class="cve-header">Update 2.4.28 released</td><td class="cve-value">2017-10-05</td></tr>
+<tr><td class="cve-header">Update 2.2.35-never released</td><td class="cve-value">--</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.34, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.27">Fixed in Apache HTTP Server 2.4.27</h1><dl>
+<dt><h3 id="CVE-2017-9788">important: <name name="CVE-2017-9788">Uninitialized memory reflection in mod_auth_digest</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-9788">CVE-2017-9788</a>)</h3></dt>
+<dd><p>The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault.</p>
+<p>Acknowledgements: We would like to thank Robert ?wi?cki for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-06-28</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Update 2.4.27 released</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.26, 2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2017-9789">important: <name name="CVE-2017-9789">Read after free in mod_http2</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-9789">CVE-2017-9789</a>)</h3></dt>
+<dd><p>When under stress, closing many connections, the HTTP/2 handling code would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.</p>
+<p>Acknowledgements: We would like to thank Robert ?wi?cki for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-06-30</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Update 2.4.27 released</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.26</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.26">Fixed in Apache HTTP Server 2.4.26</h1><dl>
+<dt><h3 id="CVE-2017-3167">important: <name name="CVE-2017-3167">ap_get_basic_auth_pw() Authentication Bypass</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-3167">CVE-2017-3167</a>)</h3></dt>
+<dd><p>Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. Third-party module writers SHOULD use ap_get_basic_auth_components(), available in 2.2.34 and 2.4.26, instead of ap_get_basic_auth_pw(). Modules which call the legacy ap_get_basic_auth_pw() during the authentication phase MUST either immediately authenticate the user after the call, or else stop the request immediately with an error r [...]
+<p>Acknowledgements: We would like to thank Emmanuel Dreyfus for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-02-06</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2017-3169">important: <name name="CVE-2017-3169">mod_ssl Null Pointer Dereference</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-3169">CVE-2017-3169</a>)</h3></dt>
+<dd><p>mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.</p>
+<p>Acknowledgements: We would like to thank Vasileios Panopoulos and AdNovum Informatik AG for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-12-05</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2017-7659">important: <name name="CVE-2017-7659">mod_http2 Null Pointer Dereference</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-7659">CVE-2017-7659</a>)</h3></dt>
+<dd><p>A maliciously constructed HTTP/2 request could cause mod_http2 to dereference a NULL pointer and crash the server process.</p>
+<p>Acknowledgements: We would like to thank Robert ?wi?cki for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-11-18</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2017-7668">important: <name name="CVE-2017-7668">ap_find_token() Buffer Overread</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-7668">CVE-2017-7668</a>)</h3></dt>
+<dd><p>The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.</p>
+<p>Acknowledgements: We would like to thank Javier Jim&eacute;nez (javijmor@gmail.com) for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2017-05-06</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.2.32</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2017-7679">important: <name name="CVE-2017-7679">mod_mime Buffer Overread</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2017-7679">CVE-2017-7679</a>)</h3></dt>
+<dd><p>mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.</p>
+<p>Acknowledgements: We would like to thank ChenQin and Hanno B&ouml;ck for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-11-15</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.4.26 released</td><td class="cve-value">2017-06-19</td></tr>
+<tr><td class="cve-header">Update 2.2.34 released</td><td class="cve-value">2017-07-11</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.25, 2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.32, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.25">Fixed in Apache HTTP Server 2.4.25</h1><dl>
+<dt><h3 id="CVE-2016-0736">low: <name name="CVE-2016-0736">Padding Oracle in Apache mod_session_crypto</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2016-0736">CVE-2016-0736</a>)</h3></dt>
+<dd><p>Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. An authentication tag (SipHash MAC) is now added to prevent such attacks.</p>
+<p>Acknowledgements: We would like to thank individuals at the RedTeam Pentesting GmbH for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-01-20</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2016-2161">low: <name name="CVE-2016-2161">DoS vulnerability in mod_auth_digest</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2016-2161">CVE-2016-2161</a>)</h3></dt>
+<dd><p>Malicious input to mod_auth_digest will cause the server to crash, and each instance continues to crash even for subsequently valid requests.</p>
+<p>Acknowledgements: We would like to thank Maksim Malyutin for reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-07-11</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2016-4975">moderate: <name name="CVE-2016-4975">mod_userdir CRLF injection</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2016-4975">CVE-2016-4975</a>)</h3></dt>
+<dd><p>Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value.</p>
+<p>Acknowledgements: The issue was discovered by Sergey Bobrov</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-07-24</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2018-08-14</td></tr>
+<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2017-01-13</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2016-5387">n/a: <name name="CVE-2016-5387">HTTP_PROXY environment variable "httpoxy" mitigation</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2016-5387">CVE-2016-5387</a>)</h3></dt>
+<dd><p>HTTP_PROXY is a well-defined environment variable in a CGI process, which collided with a number of libraries which failed to avoid colliding with this CGI namespace. A mitigation is provided for the httpd CGI environment to avoid populating the "HTTP_PROXY" variable from a "Proxy:" header, which has never been registered by IANA. This workaround and patch are documented in the ASF Advisory at asf-httpoxy-response.txt and incorporated in the 2.4.25 and 2.2.32 releases. Note: This [...]
+<p>Acknowledgements: We would like to thank Dominic Scheirlinck and Scott Geary of Vend for reporting and proposing a fix for this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-07-02</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-07-18</td></tr>
+<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2016-07-18</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2016-8740">low: <name name="CVE-2016-8740">HTTP/2 CONTINUATION denial of service</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2016-8740">CVE-2016-8740</a>)</h3></dt>
+<dd><p>The HTTP/2 protocol implementation (mod_http2) had an incomplete handling of the LimitRequestFields directive. This allowed an attacker to inject unlimited request headers into the server, leading to eventual memory exhaustion.</p>
+<p>Acknowledgements: We would like to thank Naveen Tiwari and CDF/SEFCOM at Arizona State University to reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-11-22</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-04</td></tr>
+<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2016-8743">important: <name name="CVE-2016-8743">Apache HTTP Request Parsing Whitespace Defects</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2016-8743">CVE-2016-8743</a>)</h3></dt>
+<dd><p>Apache HTTP Server, prior to release 2.4.25 (and 2.2.32), accepted a broad pattern of unusual whitespace patterns from the user-agent, including bare CR, FF, VTAB in parsing the request line and request header lines, as well as HTAB in parsing the request line. Any bare CR present in request lines was treated as whitespace and remained in the request field member "the_request", while a bare CR in the request header field name would be honored as whitespace, and a bare CR in the re [...]
+<p>Acknowledgements: We would like to thank David Dennerline at IBM Security's X-Force Researchers as well as R&eacute;gis Leroy for each reporting this issue.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-02-10</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2016-12-20</td></tr>
+<tr><td class="cve-header">Update 2.2.32 released</td><td class="cve-value">2017-01-13</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.31, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2020-11985">low: <name name="CVE-2020-11985">IP address spoofing when proxying using mod_remoteip and mod_rewrite</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2020-11985">CVE-2020-11985</a>)</h3></dt>
+<dd><p>For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.</p>
+<p>Acknowledgements: </p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-10-13</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2020-08-07</td></tr>
+<tr><td class="cve-header">Update 2.4.25 released</td><td class="cve-value">2020-08-07</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.23, 2.4.20, 2.4.18, 2.4.17, 2.4.16, 2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.23">Fixed in Apache HTTP Server 2.4.23</h1><dl>
+<dt><h3 id="CVE-2016-4979">important: <name name="CVE-2016-4979">TLS/SSL X.509 client certificate auth bypass with HTTP/2</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2016-4979">CVE-2016-4979</a>)</h3></dt>
+<dd><p>For configurations enabling support for HTTP/2, SSL client certificate validation was not enforced if configured, allowing clients unauthorized access to protected resources over HTTP/2. This issue affected releases 2.4.18 and 2.4.20 only.</p>
+<p>Acknowledgements: This issue was reported by Erki Aring.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-06-30</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-07-05</td></tr>
+<tr><td class="cve-header">Update 2.4.23 released</td><td class="cve-value">2016-07-05</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.20, 2.4.18</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.20">Fixed in Apache HTTP Server 2.4.20</h1><dl>
+<dt><h3 id="CVE-2016-1546">low: <name name="CVE-2016-1546">mod_http2: denial of service by thread starvation</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2016-1546">CVE-2016-1546</a>)</h3></dt>
+<dd><p>By manipulating the flow control windows on streams, a client was able to block server threads for long times, causing starvation of worker threads. Connections could still be opened, but no streams where processed for these. This issue affected HTTP/2 support in 2.4.17 and 2.4.18.</p>
+<p>Acknowledgements: This issue was reported by Noam Mazor.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2016-02-02</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2016-04-11</td></tr>
+<tr><td class="cve-header">Update 2.4.20 released</td><td class="cve-value">2016-04-11</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.18, 2.4.17</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.16">Fixed in Apache HTTP Server 2.4.16</h1><dl>
+<dt><h3 id="CVE-2015-0228">low: <name name="CVE-2015-0228">mod_lua: Crash in websockets PING handling</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2015-0228">CVE-2015-0228</a>)</h3></dt>
+<dd><p>A stack recursion crash in the mod_lua module was found. A Lua script executing the r:wsupgrade() function could crash the process if a malicious client sent a carefully crafted PING request. This issue affected releases 2.4.7 through 2.4.12 inclusive.</p>
+<p>Acknowledgements: This issue was reported by Guido Vranken.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-01-28</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2015-02-04</td></tr>
+<tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.4.9, 2.4.7</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2015-0253">low: <name name="CVE-2015-0253">Crash in ErrorDocument 400 handling</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2015-0253">CVE-2015-0253</a>)</h3></dt>
+<dd><p>A crash in ErrorDocument handling was found. If ErrorDocument 400 was configured pointing to a local URL-path with the INCLUDES filter active, a NULL dereference would occur when handling the error, causing the child process to crash. This issue affected the 2.4.12 release only.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-02-03</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2015-03-05</td></tr>
+<tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2015-3183">low: <name name="CVE-2015-3183">HTTP request smuggling attack against chunked request parser</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2015-3183">CVE-2015-3183</a>)</h3></dt>
+<dd><p>An HTTP request smuggling attack was possible due to a bug in parsing of chunked requests. A malicious client could force the server to misinterpret the request length, allowing cache poisoning or credential hijacking if an intermediary proxy is in use.</p>
+<p>Acknowledgements: This issue was reported by R&eacute;gis Leroy.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2015-04-04</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2015-06-09</td></tr>
+<tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
+<tr><td class="cve-header">Update 2.2.31 released</td><td class="cve-value">2015-07-16</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2015-3185">low: <name name="CVE-2015-3185">ap_some_auth_required API unusable</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2015-3185">CVE-2015-3185</a>)</h3></dt>
+<dd><p>A design error in the "ap_some_auth_required" function renders the API unusuable in httpd 2.4.x. In particular the API is documented to answering if the request required authentication but only answers if there are Require lines in the applicable configuration. Since 2.4.x Require lines are used for authorization as well and can appear in configurations even when no authentication is required and the request is entirely unrestricted. This could lead to modules using this API to al [...]
+<p>Acknowledgements: This issue was reported by Ben Reser.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-08-05</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2015-06-09</td></tr>
+<tr><td class="cve-header">Update 2.4.16 released</td><td class="cve-value">2015-07-15</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.12, 2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.5, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.4.0</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.12">Fixed in Apache HTTP Server 2.4.12</h1><dl>
+<dt><h3 id="CVE-2013-5704">low: <name name="CVE-2013-5704">HTTP Trailers processing bypass</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2013-5704">CVE-2013-5704</a>)</h3></dt>
+<dd><p>HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. This fix adds the "MergeTrailers" directive to restore legacy behavior.</p>
+<p>Acknowledgements: This issue was reported by Martin Holst Swende.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-09-06</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-10-19</td></tr>
+<tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
+<tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2014-3581">low: <name name="CVE-2014-3581">mod_cache crash with empty Content-Type header</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-3581">CVE-2014-3581</a>)</h3></dt>
+<dd><p>A NULL pointer deference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. This crash would only be a denial of service if using a threaded MPM.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-09-08</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-09-08</td></tr>
+<tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2014-3583">low: <name name="CVE-2014-3583">mod_proxy_fcgi out-of-bounds memory read</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-3583">CVE-2014-3583</a>)</h3></dt>
+<dd><p>An out-of-bounds memory read was found in mod_proxy_fcgi. A malicious FastCGI server could send a carefully crafted response which could lead to a crash when reading past the end of a heap memory or stack buffer. This issue affects version 2.4.10 only.</p>
+<p>Acknowledgements: This issue was reported by Teguh P. Alko.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-09-17</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-11-12</td></tr>
+<tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2014-8109">low: <name name="CVE-2014-8109">mod_lua multiple "Require" directive handling is broken</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-8109">CVE-2014-8109</a>)</h3></dt>
+<dd><p>Fix handling of the Require line in mod_lau when a LuaAuthzProvider is used in multiple Require directives with different arguments. This could lead to different authentication rules than expected.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-11-09</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-11-09</td></tr>
+<tr><td class="cve-header">Update 2.4.12 released</td><td class="cve-value">2015-01-30</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.10, 2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.10">Fixed in Apache HTTP Server 2.4.10</h1><dl>
+<dt><h3 id="CVE-2014-0117">moderate: <name name="CVE-2014-0117">mod_proxy denial of service</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0117">CVE-2014-0117</a>)</h3></dt>
+<dd><p>A flaw was found in mod_proxy in httpd versions 2.4.6 to 2.4.9. A remote attacker could send a carefully crafted request to a server configured as a reverse proxy, and cause the child process to crash. This could lead to a denial of service against a threaded MPM.</p>
+<p>Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-04-07</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-15</td></tr>
+<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2014-0118">moderate: <name name="CVE-2014-0118">mod_deflate denial of service</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0118">CVE-2014-0118</a>)</h3></dt>
+<dd><p>A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration.</p>
+<p>Acknowledgements: This issue was reported by Giancarlo Pellegrino and Davide Balzarotti</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-02-19</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
+<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
+<tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2014-0226">moderate: <name name="CVE-2014-0226">mod_status buffer overflow</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0226">CVE-2014-0226</a>)</h3></dt>
+<dd><p>A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page.</p>
+<p>Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-05-30</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
+<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
+<tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2014-0231">important: <name name="CVE-2014-0231">mod_cgid denial of service</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0231">CVE-2014-0231</a>)</h3></dt>
+<dd><p>A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service.</p>
+<p>Acknowledgements: This issue was reported by Rainer Jung of the ASF</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-06-16</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
+<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
+<tr><td class="cve-header">Update 2.2.29 released</td><td class="cve-value">2014-09-03</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2014-3523">important: <name name="CVE-2014-3523">WinNT MPM denial of service</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-3523">CVE-2014-3523</a>)</h3></dt>
+<dd><p>A flaw was found in the WinNT MPM in httpd versions 2.4.1 to 2.4.9, when using the default AcceptFilter for that platform. A remote attacker could send carefully crafted requests that would leak memory and eventually lead to a denial of service against the server.</p>
+<p>Acknowledgements: This issue was reported by Jeff Trawick of the ASF</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-07-01</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-15</td></tr>
+<tr><td class="cve-header">Update 2.4.10 released</td><td class="cve-value">2014-07-15</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.9, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.9">Fixed in Apache HTTP Server 2.4.9</h1><dl>
+<dt><h3 id="CVE-2013-6438">moderate: <name name="CVE-2013-6438">mod_dav crash</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2013-6438">CVE-2013-6438</a>)</h3></dt>
+<dd><p>XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn.</p>
+<p>Acknowledgements: This issue was reported by Ning Zhang &amp; Amin Tora of Neustar</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-12-10</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-03-17</td></tr>
+<tr><td class="cve-header">Update 2.4.9 released</td><td class="cve-value">2014-03-17</td></tr>
+<tr><td class="cve-header">Update 2.2.27 released</td><td class="cve-value">2014-03-26</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2014-0098">low: <name name="CVE-2014-0098">mod_log_config crash</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2014-0098">CVE-2014-0098</a>)</h3></dt>
+<dd><p>A flaw was found in mod_log_config. A remote attacker could send a specific truncated cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.</p>
+<p>Acknowledgements: This issue was reported by Rainer M Canavan</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2014-02-25</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-03-17</td></tr>
+<tr><td class="cve-header">Update 2.4.9 released</td><td class="cve-value">2014-03-17</td></tr>
+<tr><td class="cve-header">Update 2.2.27 released</td><td class="cve-value">2014-03-26</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.7">Fixed in Apache HTTP Server 2.4.7</h1><dl>
+<dt><h3 id="CVE-2013-4352">low: <name name="CVE-2013-4352">mod_cache crash</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2013-4352">CVE-2013-4352</a>)</h3></dt>
+<dd><p>A NULL pointer dereference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. (Note that this vulnerability was fixed in the 2.4.7 release, but the security impact was not disclosed at the time of the release.)</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-09-14</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2014-07-14</td></tr>
+<tr><td class="cve-header">Update 2.4.7 released</td><td class="cve-value">2013-11-26</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.6</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.6">Fixed in Apache HTTP Server 2.4.6</h1><dl>
+<dt><h3 id="CVE-2013-1896">moderate: <name name="CVE-2013-1896">mod_dav crash</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2013-1896">CVE-2013-1896</a>)</h3></dt>
+<dd><p>Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.</p>
+<p>Acknowledgements: This issue was reported by Ben Reser</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-03-07</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-05-23</td></tr>
+<tr><td class="cve-header">Update 2.4.6 released</td><td class="cve-value">2013-07-22</td></tr>
+<tr><td class="cve-header">Update 2.2.25 released</td><td class="cve-value">2013-07-22</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.4, 2.4.3, 2.4.2, 2.4.1, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2013-2249">moderate: <name name="CVE-2013-2249">mod_session_dbd session fixation flaw</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2013-2249">CVE-2013-2249</a>)</h3></dt>
+<dd><p>A flaw in mod_session_dbd caused it to proceed with save operations for a session without considering the dirty flag and the requirement for a new session ID.</p>
+<p>Acknowledgements: This issue was reported by Takashi Sato</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2013-05-29</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-07-22</td></tr>
+<tr><td class="cve-header">Update 2.4.6 released</td><td class="cve-value">2013-07-22</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.4, 2.4.3, 2.4.2, 2.4.1</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.4">Fixed in Apache HTTP Server 2.4.4</h1><dl>
+<dt><h3 id="CVE-2012-3499">low: <name name="CVE-2012-3499">XSS due to unescaped hostnames</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2012-3499">CVE-2012-3499</a>)</h3></dt>
+<dd><p>Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.</p>
+<p>Acknowledgements: This issue was reported by Niels Heinen of Google</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-07-11</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-02-18</td></tr>
+<tr><td class="cve-header">Update 2.4.4 released</td><td class="cve-value">2013-02-25</td></tr>
+<tr><td class="cve-header">Update 2.2.24 released</td><td class="cve-value">2013-02-25</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.3, 2.4.2, 2.4.1, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2012-4558">moderate: <name name="CVE-2012-4558">XSS in mod_proxy_balancer</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2012-4558">CVE-2012-4558</a>)</h3></dt>
+<dd><p>A XSS flaw affected the mod_proxy_balancer manager interface.</p>
+<p>Acknowledgements: This issue was reported by Niels Heinen of Google</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-10-07</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2013-02-18</td></tr>
+<tr><td class="cve-header">Update 2.4.4 released</td><td class="cve-value">2013-02-25</td></tr>
+<tr><td class="cve-header">Update 2.2.24 released</td><td class="cve-value">2013-02-25</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.3, 2.4.2, 2.4.1, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.3">Fixed in Apache HTTP Server 2.4.3</h1><dl>
+<dt><h3 id="CVE-2012-2687">low: <name name="CVE-2012-2687">XSS in mod_negotiation when untrusted uploads are supported</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2012-2687">CVE-2012-2687</a>)</h3></dt>
+<dd><p>Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled. Note: This issue is also known as CVE-2008-0455.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-05-31</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2012-06-13</td></tr>
+<tr><td class="cve-header">Update 2.2.23 released</td><td class="cve-value">2012-09-13</td></tr>
+<tr><td class="cve-header">Update 2.4.3 released</td><td class="cve-value">2012-08-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.2, 2.4.1, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+<dt><h3 id="CVE-2012-3502">important: <name name="CVE-2012-3502">Response mixup when using mod_proxy_ajp or mod_proxy_http</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2012-3502">CVE-2012-3502</a>)</h3></dt>
+<dd><p>The modules mod_proxy_ajp and mod_proxy_http did not always close the connection to the back end server when necessary as part of error handling. This could lead to an information disclosure due to a response mixup between users.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-08-16</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2012-08-16</td></tr>
+<tr><td class="cve-header">Update 2.4.3 released</td><td class="cve-value">2012-08-21</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.2, 2.4.1</td></tr>
+</table></dd>
+</dl>
+<h1 id="2.4.2">Fixed in Apache HTTP Server 2.4.2</h1><dl>
+<dt><h3 id="CVE-2012-0883">low: <name name="CVE-2012-0883">insecure LD_LIBRARY_PATH handling</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2012-0883">CVE-2012-0883</a>)</h3></dt>
+<dd><p>Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory.</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2012-02-14</td></tr>
+<tr><td class="cve-header">Issue public</td><td class="cve-value">2012-03-02</td></tr>
+<tr><td class="cve-header">Update 2.4.2 released</td><td class="cve-value">2012-04-17</td></tr>
+<tr><td class="cve-header">Update 2.2.23 released</td><td class="cve-value">2012-09-13</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">2.4.1, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0</td></tr>
+</table></dd>
+</dl>
+
+ <!-- FOOTER -->
+ <div id="footer">
+ <p>Copyright &copy; 1997-2024 The Apache Software Foundation.<br />
+ Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.</p>
+ </div>
+ </div>
+ </body>
+</html>
\ No newline at end of file
(httpd-site) branch asf-site updated: Automatic Site Publish by Buildbot [ In reply to ]
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/httpd-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
new 46ba304 Automatic Site Publish by Buildbot
46ba304 is described below

commit 46ba30412e2411f290ae4543d6ff5dfce20a57cb
Author: buildbot <users@infra.apache.org>
AuthorDate: Thu Apr 4 17:17:12 2024 +0000

Automatic Site Publish by Buildbot
---
output/security/json/CVE-2023-38709.json | 5 +++++
output/security/vulnerabilities-httpd.json | 5 +++++
output/security/vulnerabilities_24.html | 8 ++++++++
3 files changed, 18 insertions(+)

diff --git a/output/security/json/CVE-2023-38709.json b/output/security/json/CVE-2023-38709.json
index 5315daf..b1b0fb1 100644
--- a/output/security/json/CVE-2023-38709.json
+++ b/output/security/json/CVE-2023-38709.json
@@ -75,6 +75,11 @@
"lang": "en",
"time": "2023-06-26T00:00:00.000Z",
"value": "reported"
+ },
+ {
+ "lang": "eng",
+ "time": "2024-04-04",
+ "value": "2.4.59 released"
}
],
"title": "Apache HTTP Server: HTTP response splitting",
diff --git a/output/security/vulnerabilities-httpd.json b/output/security/vulnerabilities-httpd.json
index 1930506..a4b62b9 100644
--- a/output/security/vulnerabilities-httpd.json
+++ b/output/security/vulnerabilities-httpd.json
@@ -5238,6 +5238,11 @@
"lang": "en",
"time": "2023-06-26T00:00:00.000Z",
"value": "reported"
+ },
+ {
+ "lang": "eng",
+ "time": "2024-04-04",
+ "value": "2.4.59 released"
}
],
"title": "Apache HTTP Server: HTTP response splitting",
diff --git a/output/security/vulnerabilities_24.html b/output/security/vulnerabilities_24.html
index 8563927..ca20de7 100644
--- a/output/security/vulnerabilities_24.html
+++ b/output/security/vulnerabilities_24.html
@@ -92,6 +92,14 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<p>Please send comments or corrections for these vulnerabilities to the <a href="/security_report.html">Security Team</a>.</p> <br/>
<p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases. Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><br/>
<h1 id="2.4.59">Fixed in Apache HTTP Server 2.4.59</h1><dl>
+<dt><h3 id="CVE-2023-38709">moderate: <name name="CVE-2023-38709">Apache HTTP Server: HTTP response splitting</name>
+(<a href="https://www.cve.org/CVERecord?id=CVE-2023-38709">CVE-2023-38709</a>)</h3></dt>
+<dd><p>Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.</p><p></p><p>This issue affects Apache HTTP Server: through 2.4.58.</p><p></p>
+<p>Acknowledgements: finder: Orange Tsai (@orange_8361) from DEVCORE</p>
+<table class="table"><tr><td class="cve-header">Reported to security team</td><td class="cve-value">2023-06-26</td></tr>
+<tr><td class="cve-header">Update 2.4.59 released</td><td class="cve-value">2024-04-04</td></tr>
+<tr><td class="cve-header">Affects</td><td class="cve-value">&lt;=2.4.58</td></tr>
+</table></dd>
<dt><h3 id="CVE-2024-24795">low: <name name="CVE-2024-24795">Apache HTTP Server: HTTP Response Splitting in multiple modules</name>
(<a href="https://www.cve.org/CVERecord?id=CVE-2024-24795">CVE-2024-24795</a>)</h3></dt>
<dd><p>HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.</p><p></p><p>Users are recommended to upgrade to version 2.4.59, which fixes this issue.</p>
(httpd-site) branch asf-site updated: Automatic Site Publish by Buildbot [ In reply to ]
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/httpd-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
new 75a3ed0 Automatic Site Publish by Buildbot
75a3ed0 is described below

commit 75a3ed0aad1252caea7c1b79f2088c28286781fe
Author: buildbot <users@infra.apache.org>
AuthorDate: Mon Apr 8 19:42:42 2024 +0000

Automatic Site Publish by Buildbot
---
output/index.html | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/output/index.html b/output/index.html
index 0ec0fec..b36a378 100644
--- a/output/index.html
+++ b/output/index.html
@@ -94,18 +94,18 @@ extensible server that provides HTTP services in sync with the current HTTP
standards.</p>
<p>The Apache HTTP Server ("httpd") was launched in 1995 and it has been the most popular web server on the Internet since
April 1996. It has celebrated its 25th birthday as a project in February 2020.</p>
-<p>The Apache HTTP Server is a project of <a href="http://www.apache.org/">The Apache Software
+<p>The Apache HTTP Server is a project of <a href="https://www.apache.org/">The Apache Software
Foundation</a>.</p>
<h1 id="apache-httpd-2459-released-2024-04-04">Apache httpd 2.4.59 Released <span>2024-04-04</span><a class="headerlink" href="#apache-httpd-2459-released-2024-04-04" title="Permalink">&para;</a></h1>
<p>The Apache Software Foundation and the Apache HTTP Server Project are
pleased to
-<a href="http://downloads.apache.org/httpd/Announcement2.4.html">announce</a> the
+<a href="https://downloads.apache.org/httpd/Announcement2.4.html">announce</a> the
release of version 2.4.59 of the Apache HTTP Server ("httpd").</p>
<p>This latest release from the 2.4.x stable branch represents the best available
version of Apache HTTP Server.</p>
<p>Apache HTTP Server version 2.<span>4</span>.43 or newer is required in order to operate a TLS 1.3 web server with OpenSSL 1.1.1.</p>
-<p class="centered"><a href="download.cgi#apache24">Download</a> | <a href="http://downloads.apache.org/httpd/CHANGES_2.4.59">ChangeLog for
-2.4.59</a> | <a href="http://downloads.apache.org/httpd/CHANGES_2.4">Complete ChangeLog for
+<p class="centered"><a href="download.cgi#apache24">Download</a> | <a href="https://downloads.apache.org/httpd/CHANGES_2.4.59">ChangeLog for
+2.4.59</a> | <a href="https://downloads.apache.org/httpd/CHANGES_2.4">Complete ChangeLog for
2.4</a> | <a href="docs/trunk/new_features_2_4.html">New Features in httpd
2.4</a></p>
<h1 id="apache-httpd-22-end-of-life-2018-01-01">Apache httpd 2.2 End-of-Life <span>2018-01-01</span><a class="headerlink" href="#apache-httpd-22-end-of-life-2018-01-01" title="Permalink">&para;</a></h1>
(httpd-site) branch asf-site updated: Automatic Site Publish by Buildbot [ In reply to ]
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/httpd-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
new 699c125 Automatic Site Publish by Buildbot
699c125 is described below

commit 699c125fcbe85307a3f0e35f51815de0d2bbb815
Author: buildbot <users@infra.apache.org>
AuthorDate: Mon Apr 8 19:53:21 2024 +0000

Automatic Site Publish by Buildbot
---
output/ABOUT_APACHE.html | 2 +-
output/apreq/download.html | 2 +-
output/apreq/index.html | 2 +-
output/bug_report.html | 2 +-
output/contribute/index.html | 2 +-
output/contributors/index.html | 2 +-
output/dev/debugging.html | 2 +-
output/dev/devnotes.html | 2 +-
output/dev/guidelines.html | 2 +-
output/dev/index.html | 2 +-
output/dev/patches.html | 2 +-
output/dev/release.html | 2 +-
output/dev/styleguide.html | 2 +-
output/dev/verification.html | 2 +-
output/docs-project/avail_translations.html | 2 +-
output/docs-project/contribute.html | 2 +-
output/docs-project/contributors.html | 2 +-
output/docs-project/docsformat.html | 2 +-
output/docs-project/goingfurther.html | 2 +-
output/docs-project/index.html | 2 +-
output/docs-project/svn.html | 2 +-
output/docs-project/translations.html | 2 +-
output/docs/index.html | 2 +-
output/download.html | 2 +-
output/index.html | 2 +-
output/info/index.html | 2 +-
output/lists.html | 2 +-
output/mod_fcgid/index.html | 2 +-
output/mod_ftp/index.html | 2 +-
output/mod_mbox/index.html | 2 +-
output/mod_mbox/install.html | 2 +-
output/mod_mbox/ref.html | 2 +-
output/mod_smtpd/index.html | 2 +-
output/mod_smtpd/install.html | 2 +-
output/modules/index.html | 2 +-
output/security/impact_levels.html | 2 +-
output/security/vulnerabilities_13.html | 2 +-
output/security/vulnerabilities_20.html | 2 +-
output/security/vulnerabilities_22.html | 2 +-
output/security/vulnerabilities_24.html | 2 +-
output/security_report.html | 2 +-
output/support.html | 2 +-
output/test/index.html | 2 +-
output/usersdelist.html | 2 +-
output/userslist.html | 2 +-
45 files changed, 45 insertions(+), 45 deletions(-)

diff --git a/output/ABOUT_APACHE.html b/output/ABOUT_APACHE.html
index cb366aa..a1fc5c6 100644
--- a/output/ABOUT_APACHE.html
+++ b/output/ABOUT_APACHE.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/apreq/download.html b/output/apreq/download.html
index 84c07c8..0502b57 100644
--- a/output/apreq/download.html
+++ b/output/apreq/download.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/apreq/index.html b/output/apreq/index.html
index 3b7755f..c0d2a90 100644
--- a/output/apreq/index.html
+++ b/output/apreq/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/bug_report.html b/output/bug_report.html
index d1beb2c..46db87d 100644
--- a/output/bug_report.html
+++ b/output/bug_report.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/contribute/index.html b/output/contribute/index.html
index 94a9c81..0c74cd4 100644
--- a/output/contribute/index.html
+++ b/output/contribute/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/contributors/index.html b/output/contributors/index.html
index 3d789ae..9235195 100644
--- a/output/contributors/index.html
+++ b/output/contributors/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/dev/debugging.html b/output/dev/debugging.html
index de7eefc..15c35ac 100644
--- a/output/dev/debugging.html
+++ b/output/dev/debugging.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/dev/devnotes.html b/output/dev/devnotes.html
index e06327d..40bc40e 100644
--- a/output/dev/devnotes.html
+++ b/output/dev/devnotes.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/dev/guidelines.html b/output/dev/guidelines.html
index f0fb05f..abd139c 100644
--- a/output/dev/guidelines.html
+++ b/output/dev/guidelines.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/dev/index.html b/output/dev/index.html
index 1494fbf..909b53d 100644
--- a/output/dev/index.html
+++ b/output/dev/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/dev/patches.html b/output/dev/patches.html
index 653b18a..b806426 100644
--- a/output/dev/patches.html
+++ b/output/dev/patches.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/dev/release.html b/output/dev/release.html
index 9b90495..e6b416b 100644
--- a/output/dev/release.html
+++ b/output/dev/release.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/dev/styleguide.html b/output/dev/styleguide.html
index 483395b..62570a7 100644
--- a/output/dev/styleguide.html
+++ b/output/dev/styleguide.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/dev/verification.html b/output/dev/verification.html
index 9f0aba7..1b77ca7 100644
--- a/output/dev/verification.html
+++ b/output/dev/verification.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs-project/avail_translations.html b/output/docs-project/avail_translations.html
index 9c447f3..54082c9 100644
--- a/output/docs-project/avail_translations.html
+++ b/output/docs-project/avail_translations.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs-project/contribute.html b/output/docs-project/contribute.html
index d25c58a..34d7a53 100644
--- a/output/docs-project/contribute.html
+++ b/output/docs-project/contribute.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs-project/contributors.html b/output/docs-project/contributors.html
index a9dc304..e280180 100644
--- a/output/docs-project/contributors.html
+++ b/output/docs-project/contributors.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs-project/docsformat.html b/output/docs-project/docsformat.html
index 51217b1..255c727 100644
--- a/output/docs-project/docsformat.html
+++ b/output/docs-project/docsformat.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs-project/goingfurther.html b/output/docs-project/goingfurther.html
index a84a00a..a0f1c3c 100644
--- a/output/docs-project/goingfurther.html
+++ b/output/docs-project/goingfurther.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs-project/index.html b/output/docs-project/index.html
index 5e485ea..070a2de 100644
--- a/output/docs-project/index.html
+++ b/output/docs-project/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs-project/svn.html b/output/docs-project/svn.html
index 822ab04..6b6a934 100644
--- a/output/docs-project/svn.html
+++ b/output/docs-project/svn.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs-project/translations.html b/output/docs-project/translations.html
index 123e07b..937f823 100644
--- a/output/docs-project/translations.html
+++ b/output/docs-project/translations.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/docs/index.html b/output/docs/index.html
index 9192c41..c4d6b32 100644
--- a/output/docs/index.html
+++ b/output/docs/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/download.html b/output/download.html
index 17da3cf..1cf00fb 100644
--- a/output/download.html
+++ b/output/download.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/index.html b/output/index.html
index b36a378..4f99061 100644
--- a/output/index.html
+++ b/output/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/info/index.html b/output/info/index.html
index 066296e..efc32b4 100644
--- a/output/info/index.html
+++ b/output/info/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/lists.html b/output/lists.html
index 02eee32..40fa870 100644
--- a/output/lists.html
+++ b/output/lists.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/mod_fcgid/index.html b/output/mod_fcgid/index.html
index 5b0aa23..3b58a99 100644
--- a/output/mod_fcgid/index.html
+++ b/output/mod_fcgid/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/mod_ftp/index.html b/output/mod_ftp/index.html
index e280986..4c82ad5 100644
--- a/output/mod_ftp/index.html
+++ b/output/mod_ftp/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/mod_mbox/index.html b/output/mod_mbox/index.html
index 84b6fa7..5912b93 100644
--- a/output/mod_mbox/index.html
+++ b/output/mod_mbox/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/mod_mbox/install.html b/output/mod_mbox/install.html
index 8d9957c..796aab7 100644
--- a/output/mod_mbox/install.html
+++ b/output/mod_mbox/install.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/mod_mbox/ref.html b/output/mod_mbox/ref.html
index d16b107..49817ca 100644
--- a/output/mod_mbox/ref.html
+++ b/output/mod_mbox/ref.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/mod_smtpd/index.html b/output/mod_smtpd/index.html
index 74dcdc1..5b94720 100644
--- a/output/mod_smtpd/index.html
+++ b/output/mod_smtpd/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/mod_smtpd/install.html b/output/mod_smtpd/install.html
index d531cc3..95a2eb4 100644
--- a/output/mod_smtpd/install.html
+++ b/output/mod_smtpd/install.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/modules/index.html b/output/modules/index.html
index f509b7e..1aa7e15 100644
--- a/output/modules/index.html
+++ b/output/modules/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/security/impact_levels.html b/output/security/impact_levels.html
index c27c9e0..e955dcd 100644
--- a/output/security/impact_levels.html
+++ b/output/security/impact_levels.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/security/vulnerabilities_13.html b/output/security/vulnerabilities_13.html
index ef5091d..6844f72 100644
--- a/output/security/vulnerabilities_13.html
+++ b/output/security/vulnerabilities_13.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/security/vulnerabilities_20.html b/output/security/vulnerabilities_20.html
index a084cae..dc33e97 100644
--- a/output/security/vulnerabilities_20.html
+++ b/output/security/vulnerabilities_20.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/security/vulnerabilities_22.html b/output/security/vulnerabilities_22.html
index b67ff9b..c7d805a 100644
--- a/output/security/vulnerabilities_22.html
+++ b/output/security/vulnerabilities_22.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/security/vulnerabilities_24.html b/output/security/vulnerabilities_24.html
index ca20de7..d14b03d 100644
--- a/output/security/vulnerabilities_24.html
+++ b/output/security/vulnerabilities_24.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/security_report.html b/output/security_report.html
index cafb958..34dac27 100644
--- a/output/security_report.html
+++ b/output/security_report.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/support.html b/output/support.html
index 3a572a0..5a57c15 100644
--- a/output/support.html
+++ b/output/support.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/test/index.html b/output/test/index.html
index ffcd18d..10b57aa 100644
--- a/output/test/index.html
+++ b/output/test/index.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/usersdelist.html b/output/usersdelist.html
index 20cabf0..4da24de 100644
--- a/output/usersdelist.html
+++ b/output/usersdelist.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
diff --git a/output/userslist.html b/output/userslist.html
index 7da90ec..083967f 100644
--- a/output/userslist.html
+++ b/output/userslist.html
@@ -75,7 +75,7 @@ h1:hover > .headerlink, h2:hover > .headerlink, h3:hover > .headerlink, h4:hover
<li><a href="https://trafficcontrol.apache.org/">Apache Traffic Control</a></li>
<li><a href="https://tomcat.apache.org/">Tomcat</a></li>
<li><a href="https://apr.apache.org/">APR</a></li>
- <li><a href="http://perl.apache.org/">mod_perl</a></li>
+ <li><a href="https://perl.apache.org/">mod_perl</a></li>
</ul>
<h1 id="miscellaneous"><a href="/info/">Miscellaneous</a><a class="headerlink" href="#miscellaneous" title="Permanent link">&para;</a></h1>
<ul>
(httpd-site) branch asf-site updated: Automatic Site Publish by Buildbot [ In reply to ]
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/httpd-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
new 4ff7849 Automatic Site Publish by Buildbot
4ff7849 is described below

commit 4ff7849da20c28e8393afdcaae7d849b7750e993
Author: buildbot <users@infra.apache.org>
AuthorDate: Mon Apr 8 20:03:15 2024 +0000

Automatic Site Publish by Buildbot
---
output/security_report.html | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/output/security_report.html b/output/security_report.html
index 34dac27..dbe1269 100644
--- a/output/security_report.html
+++ b/output/security_report.html
@@ -121,7 +121,7 @@ size of inputs.</p>
tips</a></p>
<h1 id="standards">Security Standards<a class="headerlink" href="#standards" title="Permalink">&para;</a></h1>
<p>Apache HTTP Server vulnerabilities are labelled with
-<a href="http://cve.mitre.org">CVE</a> (Common Vulnerabilities and Exposures)
+<a href="https://cve.mitre.org">CVE</a> (Common Vulnerabilities and Exposures)
identifiers.</p>
<h1 id="historical">Historical Releases<a class="headerlink" href="#historical" title="Permalink">&para;</a></h1>
<p>Earlier versions of Apache HTTP Server are no longer receiving security