Apache

HTTP Server

301 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.84%
  • Veröffentlicht 09.11.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Secu...

Exploit
  • EPSS 1.77%
  • Veröffentlicht 03.11.2009 16:30:12
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafte...

  • EPSS 8.73%
  • Veröffentlicht 13.10.2009 10:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows rem...

  • EPSS 2.83%
  • Veröffentlicht 08.09.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a mal...

  • EPSS 3.99%
  • Veröffentlicht 08.09.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as...

Exploit
  • EPSS 20.93%
  • Veröffentlicht 10.07.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).

  • EPSS 21.52%
  • Veröffentlicht 05.07.2009 16:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which al...

  • EPSS 10.07%
  • Veröffentlicht 08.06.2009 01:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2)...

Exploit
  • EPSS 3.66%
  • Veröffentlicht 08.06.2009 01:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via ...

Exploit
  • EPSS 4.27%
  • Veröffentlicht 08.06.2009 01:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.