httpd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the httpd package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • L
HTTP Response Splitting

*
  • M
Out-of-bounds Read

*
  • M
Resource Exhaustion

*
  • M
HTTP Response Splitting

*
  • M
HTTP Request Smuggling

*
  • M
Out-of-bounds Read

*
  • M
Insufficient Verification of Data Authenticity

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • M
HTTP Request Smuggling

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Improper Access Control

<0:2.2.15-60.el6_9.6
  • M
Out-of-Bounds

<0:2.2.15-30.el6_5
  • M
Improper Handling of Syntactically Invalid Structure

<0:2.2.15-30.el6_5
  • M
Use After Free

<0:2.2.15-60.el6_9.6
  • H
Missing Initialization of a Variable

<0:2.2.15-60.el6_9.5
  • H
Out-of-bounds Read

<0:2.2.15-60.el6_9.5
  • H
Improper Authentication

<0:2.2.15-60.el6_9.5
  • H
NULL Pointer Dereference

<0:2.2.15-60.el6_9.5
  • M
Access Restriction Bypass

<0:2.2.15-29.el6_4
  • M
Cryptographic Issues

<0:2.2.15-28.el6_4
  • M
Cross-site Scripting (XSS)

<0:2.2.15-28.el6_4
  • M
Cross-site Scripting (XSS)

<0:2.2.15-28.el6_4
  • M
Improper Input Validation

<0:2.2.15-60.el6_9.4
  • L
Cross-site Scripting (XSS)

<0:2.2.15-26.el6
  • L
Cross-site Scripting (XSS)

<0:2.2.15-26.el6
  • L
Resource Management Errors

<0:2.2.15-26.el6
  • H
Improper Input Validation

<0:2.2.15-54.el6_8
  • M
Improper Input Validation

<0:2.2.15-15.el6_2.1
  • M
Improper Input Validation

<0:2.2.15-15.el6_2.1
  • M
Access Restriction Bypass

<0:2.2.15-15.el6_2.1
  • M
Resource Management Errors

<0:2.2.15-15.el6_2.1
  • M
Integer Overflow or Wraparound

<0:2.2.15-15.el6_2.1
  • M
Encoding Error

<0:2.2.15-47.el6_7
  • H
Resource Management Errors

<0:2.2.15-5.el6_0.1
  • M
Resource Management Errors

<0:2.2.15-9.el6_1.3
  • M
Improper Input Validation

<0:2.2.15-9.el6_1.3
  • L
Improper Authentication

<0:2.2.15-45.el6
  • H
Resource Management Errors

<0:2.2.15-31.el6_5
  • H
Improper Synchronization

<0:2.2.15-31.el6_5
  • H
Resource Exhaustion

<0:2.2.15-31.el6_5
  • L
Missing Initialization of a Variable

*
  • L
Open Redirect

*
  • M
Improper Access Control

*
  • L
Path Equivalence

*
  • M
Out-of-bounds Read

*
  • L
Authentication Bypass by Primary Weakness

*
  • L
Out-of-bounds Read

*
  • L
Cross-site Scripting (XSS)

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • M
HTTP Response Splitting

*
  • L
Out-of-Bounds

*
  • M
Information Exposure

*
  • L
Improper Input Validation

*
  • L
Resource Management Errors

*
  • L
Information Exposure

*