Page 12 of 66 results (0.008 seconds)

CVSS: 7.5EPSS: 10%CPEs: 2EXPL: 1

Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe. El servidor Apache, en sus verisones para Win32 1.3.24 y anteriores, y 2.0.x hasta la 2.0.34-beta, permite que atacantes remotos ejecuten cualquier comando a través del metacaracter "|" de la shell. Estos comandos vienen como argumentos a scrips .bat o .cmd. A su vez estos scripts pasan sin filtrado al intérprete de shell, normalmente cmd.exe • https://www.exploit-db.com/exploits/21350 http://marc.info/?l=bugtraq&m=101674082427358&w=2 http://online.securityfocus.com/archive/1/263927 http://www.apacheweek.com/issues/02-03-29#apache1324 http://www.iss.net/security_center/static/8589.php http://www.securityfocus.com/bid/4335 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.ap • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Directory traversal vulnerability in A1 HTTP server 1.0a allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP GET request. • https://www.exploit-db.com/exploits/20657 http://archives.neohapsis.com/archives/bugtraq/2001-02/0457.html •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in A1 HTTP server 1.0a allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long HTTP request. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0457.html •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

mod_rewrite in Apache 1.3.12 and earlier allows remote attackers to read arbitrary files if a RewriteRule directive is expanded to include a filename whose name contains a regular expression. • http://archives.neohapsis.com/archives/bugtraq/2000-09/0352.html http://archives.neohapsis.com/archives/bugtraq/2000-10/0174.html http://archives.neohapsis.com/archives/hp/2000-q4/0021.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-035.0.txt http://www.linux-mandrake.com/en/security/MDKSA-2000-060-2.php3?dis=7.1 http://www.redhat.com/support/errata/RHSA-2000-088.html http://www.redhat.com/support/errata/RHSA-2000-095.html http://www.securityfocus •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

mod_proxy in Apache 1.2.5 and earlier allows remote attackers to cause a denial of service via malformed FTP commands, which causes Apache to dump core. • http://marc.info/?l=bugtraq&m=88413292830649&w=2 http://www.apache.org/info/security_bulletin_1.2.5.html •