Apache

HTTP Server

301 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 16.2%
  • Veröffentlicht 26.02.2013 16:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagema...

  • EPSS 57.43%
  • Veröffentlicht 26.02.2013 16:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remo...

Exploit
  • EPSS 29.07%
  • Veröffentlicht 30.11.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an...

  • EPSS 4.72%
  • Veröffentlicht 22.08.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to in...

  • EPSS 4.44%
  • Veröffentlicht 22.08.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end c...

  • EPSS 0.21%
  • Veröffentlicht 18.04.2012 10:33:33
  • Zuletzt bearbeitet 11.04.2025 00:51:21

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apach...

  • EPSS 32.96%
  • Veröffentlicht 28.01.2012 04:05:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of s...

  • EPSS 70.5%
  • Veröffentlicht 28.01.2012 04:05:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors i...

Exploit
  • EPSS 2.18%
  • Veröffentlicht 18.01.2012 20:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memor...

  • EPSS 87.96%
  • Veröffentlicht 27.12.2011 18:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.