CVE-2002-0839
- EPSS 0.14%
- Veröffentlicht 11.10.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that...
CVE-2002-0840
- EPSS 91.33%
- Veröffentlicht 11.10.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote attackers to execute script as other web pag...
CVE-2002-0843
- EPSS 3.77%
- Veröffentlicht 11.10.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflows in the ApacheBench benchmark support program (ab.c) in Apache before 1.3.27, and Apache 2.x before 2.0.43, allow a malicious web server to cause a denial of service and possibly execute arbitrary code via a long response.
- EPSS 32.07%
- Veröffentlicht 11.10.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Apache 2.0.42 allows remote attackers to view the source code of a CGI script via a POST request to a directory with both WebDAV and CGI enabled.
- EPSS 37.38%
- Veröffentlicht 25.09.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
mod_dav in Apache before 2.0.42 does not properly handle versioning hooks, which may allow remote attackers to kill a child process via a null dereference and cause a denial of service (CPU consumption) in a preforked multi-processing module.
- EPSS 75.04%
- Veröffentlicht 05.09.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that o...
CVE-2002-0661
- EPSS 91.93%
- Veröffentlicht 12.08.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters.
CVE-2002-0392
- EPSS 59.3%
- Veröffentlicht 03.07.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.
- EPSS 1.69%
- Veröffentlicht 29.05.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
PHP, when installed with Apache and configured to search for index.php as a default web page, allows remote attackers to obtain the full pathname of the server via the HTTP OPTIONS method, which reveals the pathname in the resulting error message.
- EPSS 2.83%
- Veröffentlicht 29.05.2002 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.