Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Apache Software Foundation — Vulnerabilities & Security Advisories 1725

Browse all 1725 CVE security advisories affecting Apache Software Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Apache Software Foundation develops and maintains open-source software, primarily known for the widely deployed Apache HTTP Server and foundational Java frameworks. Its extensive portfolio exposes a significant attack surface, evidenced by the 1717 recorded CVEs. Historically, vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from complex configuration errors or input validation failures in legacy components. While the foundation enforces rigorous security review processes, the sheer volume of projects increases the likelihood of undiscovered flaws. Notable incidents include critical flaws in Log4j, which allowed remote code execution via crafted log messages, highlighting risks in dependency management. The organization relies on community-driven patching, requiring administrators to promptly apply updates to mitigate exploitation. This model ensures transparency but demands active vigilance from users to maintain system integrity against evolving threat vectors.

Found 106 results / 1725Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-38476 Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect — Apache HTTP ServerCWE-829 9.1AICriticalAI2024-07-01
CVE-2024-38475 Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches filesystem path. — Apache HTTP ServerCWE-116 9.8AICriticalAI2024-07-01
CVE-2024-38474 Apache HTTP Server weakness with encoded question marks in backreferences — Apache HTTP ServerCWE-116 9.8AICriticalAI2024-07-01
CVE-2024-38473 Apache HTTP Server proxy encoding problem — Apache HTTP ServerCWE-116 9.8AICriticalAI2024-07-01
CVE-2024-38472 Apache HTTP Server on WIndows UNC SSRF — Apache HTTP ServerCWE-918 7.5AIHighAI2024-07-01
CVE-2024-36387 Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2 — Apache HTTP ServerCWE-476 7.5AIHighAI2024-07-01
CVE-2024-27316 Apache HTTP Server: HTTP/2 DoS by memory exhaustion on endless continuation frames — Apache HTTP ServerCWE-770 7.5 -2024-04-04
CVE-2024-24795 Apache HTTP Server: HTTP Response Splitting in multiple modules — Apache HTTP ServerCWE-113 9.1 -2024-04-04
CVE-2023-38709 Apache HTTP Server: HTTP response splitting — Apache HTTP Server 7.5 -2024-04-04
CVE-2023-31122 Apache HTTP Server: mod_macro buffer over-read — Apache HTTP ServerCWE-125 7.5 -2023-10-23
CVE-2023-43622 Apache HTTP Server: DoS in HTTP/2 with initial windows size 0 — Apache HTTP ServerCWE-400 7.5 -2023-10-23
CVE-2023-45802 Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST — Apache HTTP ServerCWE-404 5.9 -2023-10-23
CVE-2023-27522 Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting — Apache HTTP ServerCWE-444 5.3 -2023-03-07
CVE-2023-25690 Apache HTTP Server: HTTP request splitting with mod_rewrite and mod_proxy — Apache HTTP ServerCWE-444 6.5 -2023-03-07
CVE-2022-37436 Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting — Apache HTTP ServerCWE-113 7.5 -2023-01-17
CVE-2022-36760 Apache HTTP Server: mod_proxy_ajp Possible request smuggling — Apache HTTP ServerCWE-444 3.7 -2023-01-17
CVE-2006-20001 Apache HTTP Server: mod_dav out of bounds read, or write of zero byte — Apache HTTP ServerCWE-787 7.5 -2023-01-17
CVE-2022-31813 mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism — Apache HTTP ServerCWE-348 9.8 -2022-06-08
CVE-2022-30556 Information Disclosure in mod_lua with websockets — Apache HTTP ServerCWE-200--2022-06-08
CVE-2022-30522 mod_sed denial of service — Apache HTTP ServerCWE-789 7.5 -2022-06-08
CVE-2022-29404 Denial of service in mod_lua r:parsebody — Apache HTTP ServerCWE-770 7.5 -2022-06-08
CVE-2022-28615 Read beyond bounds in ap_strcmp_match() — Apache HTTP ServerCWE-190 9.1 -2022-06-08
CVE-2022-28614 read beyond bounds via ap_rwrite() — Apache HTTP ServerCWE-190 5.3 -2022-06-08
CVE-2022-28330 read beyond bounds in mod_isapi — Apache HTTP ServerCWE-125 5.3 -2022-06-08
CVE-2022-26377 mod_proxy_ajp: Possible request smuggling — Apache HTTP ServerCWE-444 3.7 -2022-06-08
CVE-2022-23943 mod_sed: Read/write beyond bounds — Apache HTTP ServerCWE-787 9.1 -2022-03-14
CVE-2022-22721 core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody — Apache HTTP ServerCWE-190 9.1 -2022-03-14
CVE-2022-22720 HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier — Apache HTTP ServerCWE-444 9.8 -2022-03-14
CVE-2022-22719 mod_lua Use of uninitialized value of in r:parsebody — Apache HTTP ServerCWE-665 7.5 -2022-03-14
CVE-2021-44224 Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier — Apache HTTP ServerCWE-476 8.2 -2021-12-20

This page lists every published CVE security advisory associated with Apache Software Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.