Apache

HTTP Server

306 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.67%
  • Veröffentlicht 31.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Apache with mod_rewrite enabled on most UNIX systems allows remote attackers to bypass RewriteRules by inserting extra / (slash) characters into the requested path, which causes the regular expression in the RewriteRule to fail.

  • EPSS 7.74%
  • Veröffentlicht 12.05.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Apache before 1.3.20 on Windows and OS/2 systems allows remote attackers to cause a denial of service (GPF) via an HTTP request for a URI that contains a large number of / (slash) or other characters, which causes certain functions to dereference a n...

  • EPSS 0.11%
  • Veröffentlicht 12.03.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

htpasswd and htdigest in Apache 2.0a9, 1.3.14, and others allows local users to overwrite arbitrary files via a symlink attack.

Exploit
  • EPSS 89.5%
  • Veröffentlicht 12.03.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1...

Exploit
  • EPSS 41.99%
  • Veröffentlicht 16.02.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

PHP 3.x (PHP3) on Apache 1.3.6 allows remote attackers to read arbitrary files via a modified .. (dot dot) attack containing "%5c" (encoded backslash) sequences.

  • EPSS 6.18%
  • Veröffentlicht 19.12.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

mod_rewrite in Apache 1.3.12 and earlier allows remote attackers to read arbitrary files if a RewriteRule directive is expanded to include a filename whose name contains a regular expression.

  • EPSS 8.81%
  • Veröffentlicht 14.11.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default configuration of Apache 1.3.12 in SuSE Linux 6.4 allows remote attackers to read source code for CGI scripts by replacing the /cgi-bin/ in the requested URL with /cgi-bin-sdb/.

Exploit
  • EPSS 10.57%
  • Veröffentlicht 14.11.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary directories via the PROPFIND HTTP request method.

Exploit
  • EPSS 4.86%
  • Veröffentlicht 13.10.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root.

Exploit
  • EPSS 46.37%
  • Veröffentlicht 31.05.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Apache 1.3.x HTTP server for Windows platforms allows remote attackers to list directory contents by requesting a URL containing a large number of / characters.