Page 19 of 105 results (0.004 seconds)

CVSS: 5.0EPSS: 89%CPEs: 3EXPL: 0

The default configuration of Apache 1.3.12 in SuSE Linux 6.4 allows remote attackers to read source code for CGI scripts by replacing the /cgi-bin/ in the requested URL with /cgi-bin-sdb/. • http://archives.neohapsis.com/archives/linux/suse/2000-q3/0906.html http://www.atstake.com/research/advisories/2000/a090700-2.txt http://www.securityfocus.com/bid/1658 https://exchange.xforce.ibmcloud.com/vulnerabilities/5197 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root. • http://www.apacheweek.com/issues/00-10-13 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread. •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 2

The Apache 1.3.x HTTP server for Windows platforms allows remote attackers to list directory contents by requesting a URL containing a large number of / characters. • https://www.exploit-db.com/exploits/19975 http://www.securityfocus.com/bid/1284 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSF.4.20.0006031912360.45740-100000%40alive.znep.com https://exchange.xforce.ibmcloud.com/vulnerabilities/4575 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/threa •

CVSS: 4.3EPSS: 0%CPEs: 12EXPL: 0

Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the printenv CGI (printenv.pl), which does not encode its output, (2) pages generated by the ap_send_error_response function such as a default 404, which does not add an explicit charset, or (3) various messages that are generated by certain Apache modules or core code. NOTE: the printenv issue might still exist for web browsers that can render text/plain content types as HTML, such as Internet Explorer, but CVE regards this as a design limitation of those browsers, not Apache. The printenv.pl/acuparam vector, discloser on 20070724, is one such variant. • http://archive.cert.uni-stuttgart.de/bugtraq/2002/12/msg00243.html http://archives.neohapsis.com/archives/bugtraq/2002-12/0233.html http://httpd.apache.org/info/css-security/apache_specific.html http://marc.info/?l=bugtraq&m=118529436424127&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/10938 https://exchange.xforce.ibmcloud.com/vulnerabilities/35597 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/t • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

mod_proxy in Apache 1.2.5 and earlier allows remote attackers to cause a denial of service via malformed FTP commands, which causes Apache to dump core. • http://marc.info/?l=bugtraq&m=88413292830649&w=2 http://www.apache.org/info/security_bulletin_1.2.5.html •