Apache

HTTP Server

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.2%
  • Veröffentlicht 18.04.2012 10:33:33
  • Zuletzt bearbeitet 11.04.2025 00:51:21

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apach...

  • EPSS 32.96%
  • Veröffentlicht 28.01.2012 04:05:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of s...

  • EPSS 65.54%
  • Veröffentlicht 28.01.2012 04:05:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors i...

Exploit
  • EPSS 1.2%
  • Veröffentlicht 18.01.2012 20:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memor...

  • EPSS 82.53%
  • Veröffentlicht 27.12.2011 18:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.

  • EPSS 11.22%
  • Veröffentlicht 30.11.2011 04:05:58
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration ...

Exploit
  • EPSS 84.29%
  • Veröffentlicht 30.11.2011 04:05:58
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern ma...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 08.11.2011 11:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted S...

Exploit
  • EPSS 0.53%
  • Veröffentlicht 08.11.2011 11:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, does not restrict the size of values of environment variables, which allows local users to caus...

Exploit
  • EPSS 78.61%
  • Veröffentlicht 05.10.2011 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, wh...