Page 27 of 291 results (0.018 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

30 Oct 2001 — split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000430 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

12 Oct 2001 — Apache 1.3.20 on Windows servers allows remote attackers to bypass the default index page and list directory contents via a URL with a large number of / (slash) characters. • http://secunia.com/advisories/23794 •

CVSS: 9.8EPSS: 4%CPEs: 2EXPL: 2

12 Oct 2001 — Apache on MacOS X Client 10.0.3 with the HFS+ file system allows remote attackers to bypass access restrictions via a URL that contains some characters whose case is not matched by Apache's filters. • https://www.exploit-db.com/exploits/20911 • CWE-178: Improper Handling of Case Sensitivity •

CVSS: 5.3EPSS: 85%CPEs: 1EXPL: 1

01 Oct 2001 — Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string. • https://www.exploit-db.com/exploits/21002 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

31 Aug 2001 — Apache with mod_rewrite enabled on most UNIX systems allows remote attackers to bypass RewriteRules by inserting extra / (slash) characters into the requested path, which causes the regular expression in the RewriteRule to fail. • http://www.apacheweek.com/issues/02-02-01#security •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

12 May 2001 — Apache before 1.3.20 on Windows and OS/2 systems allows remote attackers to cause a denial of service (GPF) via an HTTP request for a URI that contains a large number of / (slash) or other characters, which causes certain functions to dereference a null pointer. • http://bugs.apache.org/index.cgi/full/7522 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

04 Apr 2001 — Buffer overflow in A1 HTTP server 1.0a allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long HTTP request. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0457.html •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 2

04 Apr 2001 — Directory traversal vulnerability in A1 HTTP server 1.0a allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP GET request. • https://www.exploit-db.com/exploits/20657 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

13 Mar 2001 — Kernel leak in AfpaCache module of the Fast Response Cache Accelerator (FRCA) component of IBM HTTP Server 1.3.x and Websphere 3.52 allows remote attackers to cause a denial of service via a series of malformed HTTP requests that generate a "bad request" error. • https://www.exploit-db.com/exploits/20531 •

CVSS: 5.3EPSS: 34%CPEs: 5EXPL: 6

12 Mar 2001 — The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex. • https://www.exploit-db.com/exploits/20692 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •