Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:apache/httpd@2.4.26
purl pkg:apache/httpd@2.4.26
Next non-vulnerable version 2.4.42
Latest non-vulnerable version 2.4.54
Risk 10.0
Vulnerabilities affecting this package (32)
Vulnerability Summary Fixed by
VCID-17hy-4ppt-xyhw
Aliases:
CVE-2021-26691
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted SessionHeader sent by an origin server could cause a heap overflow
2.4.48
Affected by 5 other vulnerabilities.
VCID-3djp-gq4c-1fa9
Aliases:
CVE-2019-10092
A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malfomed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. We have taken this opportunity to also remove request data from many other in-built error messages. Note however this issue did not affect them directly and their output was already escaped to prevent cross-site scripting attacks.
2.4.41
Affected by 9 other vulnerabilities.
VCID-5bej-9h7w-33c8
Aliases:
CVE-2017-9798
When an unrecognized HTTP Method is given in an <Limit {method}> directive in an .htaccess file, and that .htaccess file is processed by the corresponding request, the global methods table is corrupted in the current worker process, resulting in erratic behaviour. This behavior may be avoided by listing all unusual HTTP Methods in a global httpd.conf RegisterHttpMethod directive in httpd release 2.4.25 and later. To permit other .htaccess directives while denying the <Limit > directive, see the AllowOverrideList directive. Source code patch (2.4) is at; CVE-2017-9798-patch-2.4.patch Source code patch (2.2) is at; CVE-2017-9798-patch-2.2.patch Note 2.2 is end-of-life, no further release with this fix is planned. Users are encouraged to migrate to 2.4.28 or later for this and other fixes.
2.4.28
Affected by 29 other vulnerabilities.
VCID-5xrt-1n1q-4bey
Aliases:
CVE-2020-1927
In Apache HTTP Server versions 2.4.0 to 2.4.41 some mod_rewrite configurations vulnerable to open redirect.
2.4.42
Affected by 0 other vulnerabilities.
VCID-66k7-maf9-dfcd
Aliases:
CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
2.4.48
Affected by 5 other vulnerabilities.
VCID-6vxq-uxxw-ybeh
Aliases:
CVE-2019-0196
Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparision when determining the method of a request and thus process the request incorrectly.
2.4.39
Affected by 16 other vulnerabilities.
VCID-7u2r-egf2-vfhx
Aliases:
CVE-2018-17189
By sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
2.4.38
Affected by 22 other vulnerabilities.
VCID-91u7-vh6n-v7fm
Aliases:
CVE-2020-13938
Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows
2.4.48
Affected by 5 other vulnerabilities.
VCID-9qdr-1v39-d7b7
Aliases:
CVE-2018-1283
When mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. The severity is set to Moderate because "SessionEnv on" is not a default nor common configuration, it should be considered more severe when this is the case though, because of the possible remote exploitation.
2.4.33
Affected by 25 other vulnerabilities.
VCID-9vzm-qtye-ufh2
Aliases:
CVE-2018-1333
By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. This issue only affects servers that have configured and enabled HTTP/2 support, which is not the default
2.4.34
Affected by 24 other vulnerabilities.
VCID-a9rw-3s1y-hqd7
Aliases:
CVE-2019-10082
Using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
2.4.41
Affected by 9 other vulnerabilities.
VCID-apfh-r85v-dbhz
Aliases:
CVE-2018-1302
When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.33 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerabilty hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.
2.4.33
Affected by 25 other vulnerabilities.
VCID-auhk-ppv5-buaa
Aliases:
CVE-2020-1934
in Apache HTTP Server versions 2.4.0 to 2.4.41, mod_proxy_ftp use of uninitialized value with malicious FTP backend.
2.4.42
Affected by 0 other vulnerabilities.
VCID-bvkg-nrwd-e7g8
Aliases:
CVE-2021-26690
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
2.4.48
Affected by 5 other vulnerabilities.
VCID-ct26-19cq-8kd7
Aliases:
CVE-2018-17199
In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.
2.4.38
Affected by 22 other vulnerabilities.
VCID-e3jc-83a7-8uhh
Aliases:
CVE-2018-11763
By sending continous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol.
2.4.35
Affected by 23 other vulnerabilities.
VCID-eesz-v6ae-gya3
Aliases:
CVE-2020-9490
In Apache HTTP Server versions 2.4.20 to 2.4.43, a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
2.4.44
Affected by 0 other vulnerabilities.
VCID-ehv1-yvpu-ubcg
Aliases:
CVE-2019-0211
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
2.4.39
Affected by 16 other vulnerabilities.
VCID-f2y3-s6j8-7ygr
Aliases:
CVE-2019-17567
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
2.4.48
Affected by 5 other vulnerabilities.
VCID-fqem-96w3-rucb
Aliases:
CVE-2018-1312
When generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
2.4.33
Affected by 25 other vulnerabilities.
VCID-h6kk-81jx-h7b8
Aliases:
CVE-2019-10098
Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
2.4.41
Affected by 9 other vulnerabilities.
VCID-jt89-ruvk-1kbj
Aliases:
CVE-2017-9788
The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault.
2.4.27
Affected by 30 other vulnerabilities.
VCID-jzuw-73df-mfff
Aliases:
CVE-2018-1301
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.33, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
2.4.33
Affected by 25 other vulnerabilities.
VCID-khfr-kgtb-rfam
Aliases:
CVE-2017-9789
When under stress, closing many connections, the HTTP/2 handling code would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.
2.4.27
Affected by 30 other vulnerabilities.
VCID-q5wm-suxb-jfeb
Aliases:
CVE-2017-15715
The expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
2.4.33
Affected by 25 other vulnerabilities.
VCID-scf1-zmu7-e3b2
Aliases:
CVE-2018-1303
A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.33 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache.
2.4.33
Affected by 25 other vulnerabilities.
VCID-uwqg-yytc-vfae
Aliases:
CVE-2019-0220
When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
2.4.39
Affected by 16 other vulnerabilities.
VCID-v41h-pbbe-zfas
Aliases:
CVE-2019-10081
HTTP/2 very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.
2.4.41
Affected by 9 other vulnerabilities.
VCID-w6p6-u8ku-k3f6
Aliases:
CVE-2019-0217
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
2.4.39
Affected by 16 other vulnerabilities.
VCID-y3k1-c4rn-xbc2
Aliases:
CVE-2019-9517
A malicious client could perform a DoS attack by flooding a connection with requests and basically never reading responses on the TCP connection. Depending on h2 worker dimensioning, it was possible to block those with relatively few connections.
2.4.41
Affected by 9 other vulnerabilities.
VCID-yz3c-arnr-y3cs
Aliases:
CVE-2020-11993
In Apache HTTP Server versions 2.4.20 to 2.4.43, when trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
2.4.44
Affected by 0 other vulnerabilities.
VCID-zc2p-sfu7-jkhc
Aliases:
CVE-2017-15710
mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
2.4.33
Affected by 25 other vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-1189-ej89-hybs mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port. CVE-2017-3169
VCID-fyrq-yg2u-jkc7 mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header. CVE-2017-7679
VCID-qayj-kts9-3fde Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. Third-party module writers SHOULD use ap_get_basic_auth_components(), available in 2.2.34 and 2.4.26, instead of ap_get_basic_auth_pw(). Modules which call the legacy ap_get_basic_auth_pw() during the authentication phase MUST either immediately authenticate the user after the call, or else stop the request immediately with an error response, to avoid incorrectly authenticating the current request. CVE-2017-3167
VCID-twj7-4qwm-2khv The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value. CVE-2017-7668
VCID-wshe-gf99-tbg6 A maliciously constructed HTTP/2 request could cause mod_http2 to dereference a NULL pointer and crash the server process. CVE-2017-7659

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T12:36:23.054744+00:00 Apache HTTPD Importer Affected by VCID-17hy-4ppt-xyhw https://httpd.apache.org/security/json/CVE-2021-26691.json 38.0.0
2026-04-01T12:36:22.990073+00:00 Apache HTTPD Importer Affected by VCID-bvkg-nrwd-e7g8 https://httpd.apache.org/security/json/CVE-2021-26690.json 38.0.0
2026-04-01T12:36:22.920293+00:00 Apache HTTPD Importer Affected by VCID-66k7-maf9-dfcd https://httpd.apache.org/security/json/CVE-2020-35452.json 38.0.0
2026-04-01T12:36:22.837426+00:00 Apache HTTPD Importer Affected by VCID-91u7-vh6n-v7fm https://httpd.apache.org/security/json/CVE-2020-13938.json 38.0.0
2026-04-01T12:36:22.778333+00:00 Apache HTTPD Importer Affected by VCID-yz3c-arnr-y3cs https://httpd.apache.org/security/json/CVE-2020-11993.json 38.0.0
2026-04-01T12:36:22.685101+00:00 Apache HTTPD Importer Affected by VCID-eesz-v6ae-gya3 https://httpd.apache.org/security/json/CVE-2020-9490.json 38.0.0
2026-04-01T12:36:22.641611+00:00 Apache HTTPD Importer Affected by VCID-auhk-ppv5-buaa https://httpd.apache.org/security/json/CVE-2020-1934.json 38.0.0
2026-04-01T12:36:22.570769+00:00 Apache HTTPD Importer Affected by VCID-5xrt-1n1q-4bey https://httpd.apache.org/security/json/CVE-2020-1927.json 38.0.0
2026-04-01T12:36:22.504611+00:00 Apache HTTPD Importer Affected by VCID-f2y3-s6j8-7ygr https://httpd.apache.org/security/json/CVE-2019-17567.json 38.0.0
2026-04-01T12:36:22.451058+00:00 Apache HTTPD Importer Affected by VCID-h6kk-81jx-h7b8 https://httpd.apache.org/security/json/CVE-2019-10098.json 38.0.0
2026-04-01T12:36:22.363571+00:00 Apache HTTPD Importer Affected by VCID-3djp-gq4c-1fa9 https://httpd.apache.org/security/json/CVE-2019-10092.json 38.0.0
2026-04-01T12:36:22.293908+00:00 Apache HTTPD Importer Affected by VCID-a9rw-3s1y-hqd7 https://httpd.apache.org/security/json/CVE-2019-10082.json 38.0.0
2026-04-01T12:36:22.252607+00:00 Apache HTTPD Importer Affected by VCID-v41h-pbbe-zfas https://httpd.apache.org/security/json/CVE-2019-10081.json 38.0.0
2026-04-01T12:36:22.215916+00:00 Apache HTTPD Importer Affected by VCID-y3k1-c4rn-xbc2 https://httpd.apache.org/security/json/CVE-2019-9517.json 38.0.0
2026-04-01T12:36:22.179513+00:00 Apache HTTPD Importer Affected by VCID-uwqg-yytc-vfae https://httpd.apache.org/security/json/CVE-2019-0220.json 38.0.0
2026-04-01T12:36:22.120066+00:00 Apache HTTPD Importer Affected by VCID-w6p6-u8ku-k3f6 https://httpd.apache.org/security/json/CVE-2019-0217.json 38.0.0
2026-04-01T12:36:22.042990+00:00 Apache HTTPD Importer Affected by VCID-ehv1-yvpu-ubcg https://httpd.apache.org/security/json/CVE-2019-0211.json 38.0.0
2026-04-01T12:36:21.983388+00:00 Apache HTTPD Importer Affected by VCID-6vxq-uxxw-ybeh https://httpd.apache.org/security/json/CVE-2019-0196.json 38.0.0
2026-04-01T12:36:21.929666+00:00 Apache HTTPD Importer Affected by VCID-ct26-19cq-8kd7 https://httpd.apache.org/security/json/CVE-2018-17199.json 38.0.0
2026-04-01T12:36:21.871213+00:00 Apache HTTPD Importer Affected by VCID-7u2r-egf2-vfhx https://httpd.apache.org/security/json/CVE-2018-17189.json 38.0.0
2026-04-01T12:36:21.835589+00:00 Apache HTTPD Importer Affected by VCID-e3jc-83a7-8uhh https://httpd.apache.org/security/json/CVE-2018-11763.json 38.0.0
2026-04-01T12:36:21.793470+00:00 Apache HTTPD Importer Affected by VCID-9vzm-qtye-ufh2 https://httpd.apache.org/security/json/CVE-2018-1333.json 38.0.0
2026-04-01T12:36:21.766592+00:00 Apache HTTPD Importer Affected by VCID-fqem-96w3-rucb https://httpd.apache.org/security/json/CVE-2018-1312.json 38.0.0
2026-04-01T12:36:21.720052+00:00 Apache HTTPD Importer Affected by VCID-scf1-zmu7-e3b2 https://httpd.apache.org/security/json/CVE-2018-1303.json 38.0.0
2026-04-01T12:36:21.682678+00:00 Apache HTTPD Importer Affected by VCID-apfh-r85v-dbhz https://httpd.apache.org/security/json/CVE-2018-1302.json 38.0.0
2026-04-01T12:36:21.651978+00:00 Apache HTTPD Importer Affected by VCID-jzuw-73df-mfff https://httpd.apache.org/security/json/CVE-2018-1301.json 38.0.0
2026-04-01T12:36:21.590024+00:00 Apache HTTPD Importer Affected by VCID-9qdr-1v39-d7b7 https://httpd.apache.org/security/json/CVE-2018-1283.json 38.0.0
2026-04-01T12:36:21.538155+00:00 Apache HTTPD Importer Affected by VCID-q5wm-suxb-jfeb https://httpd.apache.org/security/json/CVE-2017-15715.json 38.0.0
2026-04-01T12:36:21.488879+00:00 Apache HTTPD Importer Affected by VCID-zc2p-sfu7-jkhc https://httpd.apache.org/security/json/CVE-2017-15710.json 38.0.0
2026-04-01T12:36:21.446910+00:00 Apache HTTPD Importer Affected by VCID-5bej-9h7w-33c8 https://httpd.apache.org/security/json/CVE-2017-9798.json 38.0.0
2026-04-01T12:36:21.349550+00:00 Apache HTTPD Importer Affected by VCID-khfr-kgtb-rfam https://httpd.apache.org/security/json/CVE-2017-9789.json 38.0.0
2026-04-01T12:36:21.268318+00:00 Apache HTTPD Importer Affected by VCID-jt89-ruvk-1kbj https://httpd.apache.org/security/json/CVE-2017-9788.json 38.0.0
2026-04-01T12:36:21.174174+00:00 Apache HTTPD Importer Fixing VCID-fyrq-yg2u-jkc7 https://httpd.apache.org/security/json/CVE-2017-7679.json 38.0.0
2026-04-01T12:36:21.005665+00:00 Apache HTTPD Importer Fixing VCID-twj7-4qwm-2khv https://httpd.apache.org/security/json/CVE-2017-7668.json 38.0.0
2026-04-01T12:36:20.980371+00:00 Apache HTTPD Importer Fixing VCID-wshe-gf99-tbg6 https://httpd.apache.org/security/json/CVE-2017-7659.json 38.0.0
2026-04-01T12:36:20.965582+00:00 Apache HTTPD Importer Fixing VCID-1189-ej89-hybs https://httpd.apache.org/security/json/CVE-2017-3169.json 38.0.0
2026-04-01T12:36:20.799883+00:00 Apache HTTPD Importer Fixing VCID-qayj-kts9-3fde https://httpd.apache.org/security/json/CVE-2017-3167.json 38.0.0