Apache

HTTP Server

301 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.74%
  • Veröffentlicht 05.08.2010 18:17:57
  • Zuletzt bearbeitet 11.04.2025 00:51:21

mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive resp...

  • EPSS 14.52%
  • Veröffentlicht 28.07.2010 20:00:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.

  • EPSS 8.54%
  • Veröffentlicht 18.06.2010 16:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows rem...

Exploit
  • EPSS 86.82%
  • Veröffentlicht 05.03.2010 19:30:00
  • Zuletzt bearbeitet 24.07.2025 17:43:53

modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an...

  • EPSS 2.55%
  • Veröffentlicht 05.03.2010 19:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, wh...

  • EPSS 30.73%
  • Veröffentlicht 05.03.2010 16:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial o...

Exploit
  • EPSS 0.83%
  • Veröffentlicht 05.02.2010 22:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, uses a logging format that does not identify whether a dotted quad represents an unresolved IP address, which allows remote attackers to spoof IP addresses via cra...

Exploit
  • EPSS 1.11%
  • Veröffentlicht 05.02.2010 22:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS se...

Exploit
  • EPSS 47.45%
  • Veröffentlicht 02.02.2010 16:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary co...

Exploit
  • EPSS 2.83%
  • Veröffentlicht 04.12.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that ...