Oracle Http Server vulnerabilities
103 known vulnerabilities affecting oracle/http_server.
Total CVEs
103
CISA KEV
3
actively exploited
Public exploits
9
Exploited in wild
3
Severity breakdown
CRITICAL27HIGH38MEDIUM33LOW5
Vulnerabilities
Page 3 of 6
CVE-2021-35666MEDIUMCVSS 5.9v11.1.1.9.02021-10-20
CVE-2021-35666 [MEDIUM] CVE-2021-35666: Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module)
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module). The supported version that is affected is 11.1.1.9.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized acce
nvd
CVE-2021-2480LOWCVSS 3.7v11.1.1.9.02021-10-20
CVE-2021-2480 [LOW] CVE-2021-2480: Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). The supported version that is affected is 11.1.1.9.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized update, i
nvd
CVE-2021-41617HIGHCVSS 7.0v12.2.1.2.0v12.2.1.3.0+1 more2021-09-26
CVE-2021-41617 [HIGH] CVE-2021-41617: sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration spec
nvd
CVE-2021-40438CRITICALCVSS 9.0KEVPoCv12.2.1.3.0v12.2.1.4.02021-09-16
CVE-2021-40438 [CRITICAL] CWE-918 CVE-2021-40438: A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
nvd
CVE-2021-39275CRITICALCVSS 9.8v12.2.1.3.0v12.2.1.4.02021-09-16
CVE-2021-39275 [CRITICAL] CWE-787 CVE-2021-39275: ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modu
ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
nvd
CVE-2021-34798HIGHCVSS 7.5v12.2.1.3.0v12.2.1.4.02021-09-16
CVE-2021-34798 [HIGH] CWE-476 CVE-2021-34798: Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTT
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
nvd
CVE-2021-36160HIGHCVSS 7.5v12.2.1.3.0v12.2.1.4.02021-09-16
CVE-2021-36160 [HIGH] CWE-125 CVE-2021-36160: A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory an
A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).
nvd
CVE-2021-35940HIGHCVSS 7.1v12.2.1.3.0v12.2.1.4.02021-08-23
CVE-2021-35940 [HIGH] CVE-2021-35940: An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtim
An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue.
nvd
CVE-2021-2315MEDIUMCVSS 5.4v11.1.1.9.0v12.2.1.3.0+1 more2021-04-22
CVE-2021-2315 [MEDIUM] CVE-2021-2315: Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks require human interaction from
nvd
CVE-2020-5360HIGHCVSS 7.5v11.1.1.9.0v12.1.3.0+1 more2020-12-16
CVE-2020-5360 [HIGH] CWE-127 CVE-2020-5360: Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to a Buffer Under-Read Vulnera
Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to a Buffer Under-Read Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability resulting in undefined behaviour, or a crash of the affected systems.
nvd
CVE-2020-1971MEDIUMCVSS 5.9v12.2.1.4.02020-12-08
CVE-2020-1971 [MEDIUM] CWE-476 CVE-2020-1971: The X.509 GeneralName type is a generic type for representing different types of names. One of those
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A
nvd
CVE-2020-24977MEDIUMCVSS 6.5v12.2.1.3.0v12.2.1.4.02020-09-04
CVE-2020-24977 [MEDIUM] CWE-125 CVE-2020-24977: GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesIntern
GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
nvd
CVE-2020-1967HIGHCVSS 7.5v12.2.1.4.02020-04-21
CVE-2020-1967 [HIGH] CWE-476 CVE-2020-1967: Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 han
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by
nvd
CVE-2020-2952MEDIUMCVSS 6.5v11.1.1.9.02020-04-15
CVE-2020-2952 [MEDIUM] CVE-2020-2952: Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). The supported version that is affected is 11.1.1.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized update,
nvd
CVE-2020-2545MEDIUMCVSS 5.3v11.1.1.9.0v12.1.3.0.0+1 more2020-01-15
CVE-2020-2545 [MEDIUM] CVE-2020-2545: Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module)
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle HTTP Server. Successful attacks of this vulnerability can resul
nvd
CVE-2020-2530MEDIUMCVSS 6.1v11.1.1.9.0v12.1.3.0.0+1 more2020-01-15
CVE-2020-2530 [MEDIUM] CVE-2020-2530: Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Web Listener). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle HTTP Server. Successful attacks require human interaction from
nvd
CVE-2019-10219MEDIUMCVSS 6.1v12.2.1.3.0v12.2.1.4.02019-11-08
CVE-2019-10219 [MEDIUM] CWE-79 CVE-2019-10219: A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properl
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
nvd
CVE-2019-10082CRITICALCVSS 9.1v12.2.1.3.0v12.2.1.4.02019-09-26
CVE-2019-10082 [CRITICAL] CWE-416 CVE-2019-10082: In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could b
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
nvd
CVE-2019-10097HIGHCVSS 7.2v12.2.1.4.02019-09-26
CVE-2019-10097 [HIGH] CWE-476 CVE-2019-10097: In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary
In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.
nvd
CVE-2019-5482CRITICALCVSS 9.8v12.2.1.3.0v12.2.1.4.02019-09-16
CVE-2019-5482 [CRITICAL] CWE-122 CVE-2019-5482: Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
nvd