Page 24 of 182 results (0.005 seconds)

CVSS: 6.4EPSS: 2%CPEs: 15EXPL: 0

Apache 2 before 2.0.47, and certain versions of mod_ssl for Apache 1.3, do not properly handle "certain sequences of per-directory renegotiations and the SSLCipherSuite directive being used to upgrade from a weak ciphersuite to a strong one," which could cause Apache to use the weak ciphersuite. Apache 2 anteriores a 2.0.47, y ciertas versiones de mod_ssl para Apache 1.3, no manejan adecuadamente "ciertas secuencias de re-negociaciones por directorio junto con la directiva SSLCipherSuite siendo usada para mejorar de un nivel de cifrado (ciphersuite) débil a uno fuerte", lo que podría hacer que apache utilizara el nivel de cifrado débil. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.6/SCOSA-2004.6.txt http://marc.info/?l=bugtraq&m=105776593602600&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:075 http://www.redhat.com/support/errata/RHSA-2003-240.html http://www.redhat.com/support/errata/RHSA-2003-243.html http://www.redhat.com/support/errata/RHSA-2003-244.html https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E https://lists&# •

CVSS: 5.0EPSS: 0%CPEs: 15EXPL: 0

The prefork MPM in Apache 2 before 2.0.47 does not properly handle certain errors from accept, which could lead to a denial of service. El MPM pre-desdoblamiento (prefork) en Apache 2 anteriores a 2.0.47 no maneja apropiadamente ciertos errores de accept(), lo que podría llevar a una denegación de servicio. • http://marc.info/?l=bugtraq&m=105776593602600&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:075 http://www.redhat.com/support/errata/RHSA-2003-240.html https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E https:&# •

CVSS: 5.0EPSS: 0%CPEs: 15EXPL: 0

Apache 2 before 2.0.47, when running on an IPv6 host, allows attackers to cause a denial of service (CPU consumption by infinite loop) when the FTP proxy server fails to create an IPv6 socket. Apache 2 anteriores a la 2.0.47, cuando es ejecutado en un sistema IPv6, permite a atacantes causar la Denegación de Servicios (DoS) cuando el servidor proxy FTP falla al crear una conexión IPv6. • http://marc.info/?l=bugtraq&m=105776593602600&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2003:075 http://www.redhat.com/support/errata/RHSA-2003-240.html https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E https:&# •

CVSS: 5.0EPSS: 96%CPEs: 9EXPL: 1

Vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library for Apache 2.0.37 through 2.0.45 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors. Vulnerabilidad desconocida en Apache 2.0.37 hasta 2-0-45 permite que atacantes remotos provoquen una denegación de servicio (caída) mediante mod_dav y posiblemente otros vectores. • https://www.exploit-db.com/exploits/38 http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0095.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000661 http://marc.info/?l=bugtraq&m=105418115512559&w=2 http://www.apache.org/dist/httpd/Announcement2.html http://www.idefense.com/advisory/05.30.03.txt http://www.kb.cert.org/vuls/id/757612 http://www.mandriva.com/security/advisories?name=MDKSA-2003:063 http://www.redhat.com/support/errata/RHSA-2003& •

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 0

The authentication module for Apache 2.0.40 through 2.0.45 on Unix does not properly handle threads safely when using the crypt_r or crypt functions, which allows remote attackers to cause a denial of service (failed Basic authentication with valid usernames and passwords) when a threaded MPM is used. El módulo de autenticación para Apache 2.0.40 hasta 2.0.45 en Unix no maneja de manera segura los threads cuando usa las funciones crypt_r o crypt, lo que permite que atacantes remotos provoquen una denegación de servicio cuando se usa un thread MPM (autentificación básica fallida con nombres de usuarios y passwords válidos). • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000661 http://marc.info/?l=bugtraq&m=105418115512559&w=2 http://secunia.com/advisories/8881 http://www.apache.org/dist/httpd/Announcement2.html http://www.kb.cert.org/vuls/id/479268 http://www.redhat.com/support/errata/RHSA-2003-186.html http://www.securityfocus.com/bid/7725 https://exchange.xforce.ibmcloud.com/vulnerabilities/12091 https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs •