Apache

HTTP Server

301 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 75.04%
  • Veröffentlicht 05.09.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that o...

  • EPSS 91.93%
  • Veröffentlicht 12.08.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters.

  • EPSS 59.3%
  • Veröffentlicht 03.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.

  • EPSS 1.69%
  • Veröffentlicht 29.05.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.

  • EPSS 2.83%
  • Veröffentlicht 29.05.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.

  • EPSS 6.65%
  • Veröffentlicht 29.05.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Cross-site scripting vulnerability in auction.pl of MakeBid Auction Deluxe 3.30 allows remote attackers to obtain information from other users via the form fields (1) TITLE, (2) DESCTIT, (3) DESC, (4) searchstring, (5) ALIAS, (6) EMAIL, (7) ADDRESS1,...

  • EPSS 5.14%
  • Veröffentlicht 06.05.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The ap_log_rerror function in Apache 2.0 through 2.035, when a CGI application encounters an error, sends error messages to the client that include the full path for the server, which allows remote attackers to obtain sensitive information.

  • EPSS 89.02%
  • Veröffentlicht 21.03.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the ...

  • EPSS 0.2%
  • Veröffentlicht 31.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these sess...

  • EPSS 1.77%
  • Veröffentlicht 31.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX...