Apache

Portable Runtime

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 26.08.2024 14:15:07
  • Zuletzt bearbeitet 13.03.2025 15:15:39

Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or bu...

  • EPSS 0.13%
  • Veröffentlicht 31.01.2023 16:15:08
  • Zuletzt bearbeitet 27.03.2025 15:15:36

Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0.

  • EPSS 0.23%
  • Veröffentlicht 31.01.2023 16:15:08
  • Zuletzt bearbeitet 27.03.2025 15:15:37

On Windows, Apache Portable Runtime 1.7.0 and earlier may write beyond the end of a stack based buffer in apr_socket_sendv(). This is a result of integer overflow.

  • EPSS 0.06%
  • Veröffentlicht 23.08.2021 10:15:07
  • Zuletzt bearbeitet 21.11.2024 06:12:47

An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared t...

  • EPSS 0.29%
  • Veröffentlicht 24.10.2017 01:29:02
  • Zuletzt bearbeitet 20.04.2025 01:37:25

When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially r...

  • EPSS 31.95%
  • Veröffentlicht 10.02.2012 19:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consu...

Exploit
  • EPSS 56.21%
  • Veröffentlicht 16.05.2011 17:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac...

  • EPSS 8.73%
  • Veröffentlicht 13.10.2009 10:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows rem...

Exploit
  • EPSS 6.5%
  • Veröffentlicht 06.08.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code ...