Apache

HTTP Server

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 30.73%
  • Veröffentlicht 05.03.2010 16:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial o...

Exploit
  • EPSS 1.18%
  • Veröffentlicht 05.02.2010 22:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, uses a logging format that does not identify whether a dotted quad represents an unresolved IP address, which allows remote attackers to spoof IP addresses via cra...

Exploit
  • EPSS 1.98%
  • Veröffentlicht 05.02.2010 22:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS se...

Exploit
  • EPSS 47.45%
  • Veröffentlicht 02.02.2010 16:30:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary co...

Exploit
  • EPSS 2.83%
  • Veröffentlicht 04.12.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that ...

Exploit
  • EPSS 3.08%
  • Veröffentlicht 09.11.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Secu...

Exploit
  • EPSS 1.31%
  • Veröffentlicht 03.11.2009 16:30:12
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafte...

  • EPSS 8.73%
  • Veröffentlicht 13.10.2009 10:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows rem...

  • EPSS 2.83%
  • Veröffentlicht 08.09.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a mal...

  • EPSS 3.99%
  • Veröffentlicht 08.09.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as...