Apache

HTTP Server

301 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 75.04%
  • Published 05.09.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that o...

  • EPSS 91.93%
  • Published 12.08.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters.

  • EPSS 59.3%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.

  • EPSS 1.69%
  • Published 29.05.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.

  • EPSS 2.83%
  • Published 29.05.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.

  • EPSS 6.65%
  • Published 29.05.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Cross-site scripting vulnerability in auction.pl of MakeBid Auction Deluxe 3.30 allows remote attackers to obtain information from other users via the form fields (1) TITLE, (2) DESCTIT, (3) DESC, (4) searchstring, (5) ALIAS, (6) EMAIL, (7) ADDRESS1,...

  • EPSS 5.14%
  • Published 06.05.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

The ap_log_rerror function in Apache 2.0 through 2.035, when a CGI application encounters an error, sends error messages to the client that include the full path for the server, which allows remote attackers to obtain sensitive information.

  • EPSS 89.02%
  • Published 21.03.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the ...

  • EPSS 0.2%
  • Published 31.12.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these sess...

  • EPSS 1.77%
  • Published 31.12.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX...