Page 8 of 48 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 50EXPL: 0

PHP 4.3.4 and earlier in Apache 1.x and 2.x (mod_php) can leak global variables between virtual hosts that are handled by the same Apache child process but have different settings, which could allow remote attackers to obtain sensitive information. PHP 4.3.4 y anteriores en Apache 1.x y 2.x (mod_php) pude filtrar variables globales entre servidores virtuales con diferente configuración que son manejadas por el mismo proceso hijo de Apache, lo que podría permitir a atacantes remotos obtener información sensible. • http://security.gentoo.org/glsa/glsa-200402-01.xml http://www.osvdb.org/3878 http://www.securityfocus.com/bid/9599 https://exchange.xforce.ibmcloud.com/vulnerabilities/15072 •

CVSS: 5.0EPSS: 0%CPEs: 11EXPL: 2

Directory traversal vulnerability in Apache 1.3.29 and earlier, and Apache 2.0.48 and earlier, when running on Cygwin, allows remote attackers to read arbitrary files via a URL containing "..%5C" (dot dot encoded backslash) sequences. Vulnerabilidad de atravesamiento de directorios en Apache 1.3.29 y anteriores, y Apache 2.0.48 y anteriores, cuando se ejecuta sobre Cygwin, permite a atacantes remotos leer ficheros arbitrarios mediante una URL conteniendo secuencias "..%5C" (punto punto barra atrás codificada) • https://www.exploit-db.com/exploits/23751 http://issues.apache.org/bugzilla/show_bug.cgi?id=26152 http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017740.html http://marc.info/?l=bugtraq&m=107765545431387&w=2 http://secunia.com/advisories/10962 http://www.apacheweek.com/issues/04-03-12 http://www.securityfocus.com/bid/9733 https://exchange.xforce.ibmcloud.com/vulnerabilities/15293 •

CVSS: 7.5EPSS: 37%CPEs: 1EXPL: 0

Apache 1.4.x before 1.3.30, and 2.0.x before 2.0.49, when using multiple listening sockets on certain platforms, allows remote attackers to cause a denial of service (blocked new connections) via a "short-lived connection on a rarely-accessed listening socket." Apache anteriores 2.0.49, cuando usa múltiples sockets en escucha en ciertas plataformas, permite a atacantes remotos causar una denegación de servicio (bloqueo de nuevas conexiones) mediante una "conexión de vida corta en un socket en escucha raramente accedido. • http://marc.info/?l=bugtraq&m=107973894328806&w=2 http://marc.info/?l=bugtraq&m=108066914830552&w=2 http://marc.info/?l=bugtraq&m=108369640424244&w=2 http://marc.info/?l=bugtraq&m=108437852004207&w=2 http://marc.info/? • CWE-667: Improper Locking •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret. mod_digest de Apache no verifica adecuadamente el nonce de una respuesta de cliente usando un secreto AuthNonce. • http://marc.info/?l=bugtraq&m=108437852004207&w=2 http://security.gentoo.org/glsa/glsa-200405-22.xml http://securitytracker.com/id?1008920 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1 http://sunsolve.sun.com/search/document.do? •

CVSS: 5.0EPSS: 8%CPEs: 1EXPL: 0

The rotatelogs program on Apache before 1.3.28, for Windows and OS/2 systems, does not properly ignore certain control characters that are received over the pipe, which could allow remote attackers to cause a denial of service. El programa rotatelogs en Apache anteriores a 1.3.28 para Windows y OS/2, no ignora adecuadamente ciertos caractéres de control que son recibidos por la tubería, lo que podría permitir a atacantes remotos causar una denegación de servicio. • http://www.apache.org/dist/httpd/Announcement.html http://www.kb.cert.org/vuls/id/694428 https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd •