Apache

HTTP Server

317 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 13.04.2007 17:19:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the...

  • EPSS 0.09%
  • Veröffentlicht 13.04.2007 16:19:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE...

  • EPSS 89.48%
  • Veröffentlicht 16.03.2007 22:19:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence...

  • EPSS 2.49%
  • Veröffentlicht 05.01.2007 18:28:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment. NOT...

  • EPSS 32.79%
  • Veröffentlicht 16.10.2006 19:07:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Format string vulnerability in the mod_tcl module 1.0 for Apache 2.x allows context-dependent attackers to execute arbitrary code via format string specifiers that are not properly handled in a set_var function call in (1) tcl_cmds.c and (2) tcl_core...

Exploit
  • EPSS 17.32%
  • Veröffentlicht 14.08.2006 20:04:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Apache 2.2.2, when running on Windows, allows remote attackers to read source code of CGI programs via a request that contains uppercase (or alternate case) characters that bypass the case-sensitive ScriptAlias directive, but allow access to the file...

  • EPSS 90.02%
  • Veröffentlicht 28.07.2006 18:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (applica...

Exploit
  • EPSS 91.37%
  • Veröffentlicht 28.07.2006 00:04:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected ba...

  • EPSS 43.46%
  • Veröffentlicht 31.12.2005 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers...

  • EPSS 25.58%
  • Veröffentlicht 13.12.2005 20:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.