Page 17 of 105 results (0.007 seconds)

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 0

Apache before 1.3.20 on Windows and OS/2 systems allows remote attackers to cause a denial of service (GPF) via an HTTP request for a URI that contains a large number of / (slash) or other characters, which causes certain functions to dereference a null pointer. • http://bugs.apache.org/index.cgi/full/7522 http://marc.info/?l=bugtraq&m=99054258728748&w=2 http://online.securityfocus.com/archive/1/176144 http://www.apacheweek.com/issues/01-05-25 http://www.iss.net/security_center/static/6527.php http://www.securityfocus.com/bid/2740 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.o •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Directory traversal vulnerability in A1 HTTP server 1.0a allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP GET request. • https://www.exploit-db.com/exploits/20657 http://archives.neohapsis.com/archives/bugtraq/2001-02/0457.html •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in A1 HTTP server 1.0a allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long HTTP request. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0457.html •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

Kernel leak in AfpaCache module of the Fast Response Cache Accelerator (FRCA) component of IBM HTTP Server 1.3.x and Websphere 3.52 allows remote attackers to cause a denial of service via a series of malformed HTTP requests that generate a "bad request" error. • https://www.exploit-db.com/exploits/20531 http://archives.neohapsis.com/archives/bugtraq/2001-01/0079.html http://archives.neohapsis.com/archives/bugtraq/2001-03/0061.html http://www-4.ibm.com/software/webservers/security.html http://www.securityfocus.com/bid/2175 https://exchange.xforce.ibmcloud.com/vulnerabilities/5900 •

CVSS: 5.0EPSS: 94%CPEs: 5EXPL: 6

The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex. • https://www.exploit-db.com/exploits/20692 https://www.exploit-db.com/exploits/20693 https://www.exploit-db.com/exploits/20694 https://www.exploit-db.com/exploits/20695 http://www.apacheweek.com/features/security-13 http://www.debian.org/security/2001/dsa-067 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-077.php3 http://www.linuxsecurity.com/advisories/other_advisory-1452.html http://www.securityfocus.com/archive/1/168497 http://www.securityfocus.com/archive • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •