[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:509185
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix: httpd: mod_http2: CONTINUATION frames DoS For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CV ...

oval:org.secpod.oval:def:1702260
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion

oval:org.secpod.oval:def:708872
apache2: Apache HTTP server Several security issues were fixed in Apache HTTP Server.

oval:org.secpod.oval:def:2600543
The mod_h2 Apache httpd module implements the HTTP2 protocol on top of libnghttp2 for httpd 2.4 servers.

oval:org.secpod.oval:def:613057
Multiple vulnerabilities have been discovered in the Apache HTTP server, which may result in HTTP response splitting or denial of service.

oval:org.secpod.oval:def:99579
apache2: Apache HTTP server Several security issues were fixed in Apache HTTP Server.

oval:org.secpod.oval:def:509202
The mod_h2 Apache httpd module implements the HTTP2 protocol on top of libnghttp2 for httpd 2.4 servers. Security Fix: httpd: CONTINUATION frames DoS For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page ...

oval:org.secpod.oval:def:99001
The host is installed with Apache HTTP Server through 2.4.58 and is prone to an uncontrolled resource consumption vulnerability. A flaw is present in the application, which fails to properly handle a HTTP/2 incoming headers exceeding the limit. Successful exploitation could allows attackers to cause ...

oval:org.secpod.oval:def:1507468
[1.15.19-5.1] - Resolves: RHEL-29826 - mod_http2: httpd: CONTINUATION frames DoS

oval:org.secpod.oval:def:1507502
[2.0.26-2] - Resolves: RHEL-31855 - mod_http2: httpd: CONTINUATION frames DoS [2.0.26-1] - Resolves: RHEL-14691 - mod_http2 rebase to 2.0.26

oval:org.secpod.oval:def:1507463
httpd mod_http2 [1.15.7-8.5] - Resolves: RHEL-29816 - httpd:2.4/mod_http2: httpd: CONTINUATION frames DoS mod_md

oval:org.secpod.oval:def:127533
The mod_h2 Apache httpd module implements the HTTP2 protocol on top of libnghttp2 for httpd 2.4 servers.

oval:org.secpod.oval:def:127531
The mod_h2 Apache httpd module implements the HTTP2 protocol on top of libnghttp2 for httpd 2.4 servers.

oval:org.secpod.oval:def:2501373
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

oval:org.secpod.oval:def:1601900
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion

oval:org.secpod.oval:def:99995
Multiple vulnerabilities have been discovered in the Apache HTTP server, which may result in HTTP response splitting or denial of service.

CWE    1
CWE-400
*CVE
CVE-2024-27316
XCCDF    1

© SecPod Technologies