CVE-2023-49582
- EPSS 0.02%
- Published 26.08.2024 14:15:07
- Last modified 13.03.2025 15:15:39
Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or bu...
CVE-2022-24963
- EPSS 0.13%
- Published 31.01.2023 16:15:08
- Last modified 27.03.2025 15:15:36
Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime (APR) version 1.7.0.
CVE-2022-28331
- EPSS 0.23%
- Published 31.01.2023 16:15:08
- Last modified 27.03.2025 15:15:37
On Windows, Apache Portable Runtime 1.7.0 and earlier may write beyond the end of a stack based buffer in apr_socket_sendv(). This is a result of integer overflow.
CVE-2021-35940
- EPSS 0.06%
- Published 23.08.2021 10:15:07
- Last modified 21.11.2024 06:12:47
An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared t...
CVE-2017-12613
- EPSS 0.29%
- Published 24.10.2017 01:29:02
- Last modified 20.04.2025 01:37:25
When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially r...
- EPSS 31.95%
- Published 10.02.2012 19:55:02
- Last modified 11.04.2025 00:51:21
tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consu...
CVE-2011-0419
- EPSS 56.21%
- Published 16.05.2011 17:55:02
- Last modified 11.04.2025 00:51:21
Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac...
CVE-2009-2699
- EPSS 8.73%
- Published 13.10.2009 10:30:00
- Last modified 09.04.2025 00:30:58
The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows rem...
- EPSS 6.5%
- Published 06.08.2009 15:30:00
- Last modified 09.04.2025 00:30:58
Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code ...