Total vulnerabilities in the database
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
Software | From | Fixed in |
---|---|---|
apache / http_server | 2.4.0 | 2.4.38.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |
fedoraproject / fedora | 28 | 28.x |
fedoraproject / fedora | 29 | 29.x |
fedoraproject / fedora | 30 | 30.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 18.10 | 18.10.x |
redhat / enterprise_linux_desktop | 7.0 | 7.0.x |
redhat / enterprise_linux_workstation | 7.0 | 7.0.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
opensuse / leap | 42.3 | 42.3.x |
opensuse / leap | 15.0 | 15.0.x |
oracle / retail_xstore_point_of_service | 7.1 | 7.1.x |
oracle / retail_xstore_point_of_service | 7.0 | 7.0.x |
oracle / http_server | 12.2.1.3.0 | 12.2.1.3.0.x |
oracle / enterprise_manager_ops_center | 12.3.3 | 12.3.3.x |
oracle / enterprise_manager_ops_center | 12.4.0 | 12.4.0.x |