Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect
Apache 2.4
httpd: mod_mime buffer overread
httpd: mod_ssl NULL pointer dereference
httpd: ap_get_basic_auth_pw() authentication bypass
httpd: Weak Digest auth nonce generation in mod_auth_digest
httpd: mod_proxy_uwsgi buffer overflow
Apache HTTP Server mod_session response handling heap overflow
ap_escape_quotes buffer overflow
Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773)
Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier
mod_sed: Read/write beyond bounds
HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier
mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism
Apache HTTP Server: HTTP request splitting with mod_rewrite and mod_proxy
Apache HTTP Server: mod_ssl access control bypass with session resumption
Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches filesystem path.
httpd: Uninitialized memory reflection in mod_auth_digest
httpd: read-after-free in h2 connection shutdown
core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody
Read beyond bounds in ap_strcmp_match()
mod_proxy SSRF
Apache HTTP Server: mod_proxy_ajp Possible request smuggling
Apache HTTP Server: http2: double free and possible RCE on early reset
Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr
Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...
Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier
Apache HTTP Server weakness with encoded question marks in backreferences
Apache HTTP Server proxy encoding problem
HTTPD: sets environmental variable based on user supplied Proxy request header
httpd: <FilesMatch> bypass with a trailing newline in the file name
httpd: privilege escalation from modules scripts
Apache HTTP Server: mod_dav_lock indirect lock crash
Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data()
Apache HTTP Server: NTLM Leakage on Windows through UNC SSRF
Apache HTTP Server: mod_md (ACME), unintended retry intervals
Apache HTTP Server: HTTP/2 DoS by Memory Increase
Apache HTTP Server: mod_proxy_http2 denial of service
Apache HTTP Server: mod_ssl error log variable escaping
Apache HTTP Server: SSRF on Windows due to UNC paths
Apache HTTP Server: SSRF with mod_headers setting Content-Type header
Apache HTTP Server: HTTP response splitting
Mod_auth_openidc: dos via empty post in mod_auth_openidc with oidcpreservepost enabled
Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious request
Apache HTTP Server on WIndows UNC SSRF
Apache HTTP Server: mod_rewrite proxy handler substitution
Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows
Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames
httpd: mod_session_dbd session fixation flaw
httpd: WinNT MPM denial of service
httpd: X509 client certificate authentication bypass using HTTP/2
httpd: Apache HTTP Request Parsing Whitespace Defects
httpd: Incomplete handling of LimitRequestFields directive in mod_http2
httpd: DoS vulnerability in mod_auth_digest
httpd: Padding Oracle in Apache mod_session_crypto
httpd: ap_find_token() buffer overread
httpd: mod_http2 NULL pointer dereference
httpd: Read after free in mod_http2
httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS
httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values
mod_md, DoS via Coredumps on specially crafted requests
DoS for HTTP/2 connections by crafted requests
httpd: mod_ssl: infinite loop triggered by client-initiated renegotiation when using OpenSSL 1.1.1
httpd: mod_session_cookie does not respect expiry time
httpd: mod_auth_digest: access control bypass due to race condition
httpd: mod_ssl: access control bypass when using per-location client certification authentication
httpd: memory corruption on early pushes
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service
httpd: mod_http2 concurrent pool usage
httpd: Push diary crash on specifically crafted HTTP/2 header
NULL pointer dereference on specially crafted HTTP/2 request
mod_session NULL pointer dereference
mod_proxy_http NULL pointer dereference
mod_proxy_uwsgi out of bound read
NULL pointer dereference in httpd core
Request splitting via HTTP/2 method injection and mod_proxy
Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49
null pointer dereference in h2 fuzzing
mod_lua Use of uninitialized value of in r:parsebody
Information Disclosure in mod_lua with websockets
mod_sed denial of service
Denial of service in mod_lua r:parsebody
mod_proxy_ajp: Possible request smuggling
Apache HTTP Server: mod_dav out of bounds read, or write of zero byte
Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting
Apache HTTP Server: DoS in HTTP/2 with initial windows size 0
Apache HTTP Server: mod_macro buffer over-read
Apache HTTP Server: mod_ssl TLS upgrade attack
Apache HTTP Server: mod_md unrestricted OCSP response
Apache HTTP Server: HTTP response splitting
mod_auth_digest possible stack overflow by one nul byte
httpd: null-pointer dereference in mod_remoteip
httpd: insecure handling of LD_LIBRARY_PATH in envvars
httpd: mod_status heap-based buffer overflow
Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line
Apache HTTP Server: CGI environment variable override
Apache HTTP Server: 'RewriteCond expr' always evaluates to true in 2.4.64
Apache HTTP Server: HTTP Response Splitting in multiple modules
Apache HTTP Server: source code disclosure with handlers configured via AddType
mod_userdir CRLF injection
httpd: mod_rewrite potential open redirect
httpd: limited cross-site scripting in mod_proxy error page
httpd: mod_rewrite configurations vulnerable to open redirect
httpd: mod_http2 denial-of-service by thread starvation
httpd: Use-after-free on HTTP/2 stream shutdown
httpd: Out of bounds access after failure in reading the HTTP request
httpd: DoS for HTTP/2 connections by continuous SETTINGS frames
Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST
Improper Handling of Insufficient Privileges
Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo
Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2
Apache HTTP Server: mod_authn_socache crash
Apache HTTP Server: Off-by-one OOB reads in AJP getter functions
Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)
Apache HTTP Server: source code disclosure with handlers configured via AddType
httpd: IP address spoofing when proxying using mod_remoteip and mod_rewrite
httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications
httpd: mod_http2: DoS via slow, unneeded request bodies
httpd: URL normalization inconsistency
httpd: mod_http2: read-after-free on a string compare
httpd: mod_proxy_ftp use of uninitialized value
Unexpected URL matching with 'MergeSlashes OFF'
mod_proxy_wstunnel tunneling of non Upgraded connections
read beyond bounds via ap_rwrite()
read beyond bounds in mod_isapi
Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting
httpd: mod_log_config does not properly handle logging certain cookies resulting in DoS
httpd: mod_dav denial of service via crafted DAV WRITE request
httpd: mod_cgid denial of service
httpd: mod_proxy_fcgi handle_headers() buffer over read
httpd: NULL pointer dereference in mod_cache if Content-Type has empty value
httpd: bypass of mod_headers rules via chunked requests
httpd: NULL pointer dereference crash with ErrorDocument 400 pointing to a local URL-path
httpd: Possible mod_lua crash due to websocket bug
Apache HTTP Server: mod_auth_digest timing attack
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled
mod_cluster: Protocol parsing logic error
mod_proxy_http): Information disclosure due improper management of back end server connection close within error handling
httpd: XSS flaw in mod_proxy_balancer manager interface
httpd: multiple XSS flaws due to unescaped hostnames
httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav
httpd: mod_cache NULL pointer dereference crash
httpd: mod_deflate denial of service
httpd: mod_proxy denial of service
httpd: LuaAuthzProvider argument handling issue
httpd: mod_http2: possible crash on late upgrade
httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4
httpd: HTTP request smuggling attack against chunked request parser
httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled
Apache HTTP Server: buffer overflow in mod_proxy_ajp via ajp_msg_check_header()