Page 15 of 95 results (0.016 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0231.html http://httpd.apache.org/docs/logs.html http://www.iss.net/security_center/static/7363.php • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication. • http://cert.uni-stuttgart.de/archive/bugtraq/2001/11/msg00084.html http://www.iss.net/security_center/static/7494.php http://www.securityfocus.com/bid/3521 • CWE-384: Session Fixation •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

The default installation of Apache before 1.3.19 on Mandrake Linux 7.1 through 8.0 and Linux Corporate Server 1.0.1 allows remote attackers to list the directory index of arbitrary web directories. • http://www.kb.cert.org/vuls/id/913704 http://www.mandriva.com/security/advisories?name=MDKSA-2001:077-2 https://exchange.xforce.ibmcloud.com/vulnerabilities/8029 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000430 http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077 http://www.apacheweek.com/issues/01-09-28#security http://www.linuxsecurity.com/advisories/other_advisory-1649.html http://www.redhat.com/support/errata/RHSA-2001-126.html http://www.redhat.com/support/errata/RHSA-2001-164.html https://exchange.xforce.ibmcloud.com/vulnerabilities/7419 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Apache 1.3.20 on Windows servers allows remote attackers to bypass the default index page and list directory contents via a URL with a large number of / (slash) characters. • http://secunia.com/advisories/23794 http://securitytracker.com/id?1017522 http://www.apacheweek.com/issues/01-09-28#security http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html http://www.securityfocus.com/bid/22083 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rf2f0f3611f93 •