Vulnerabilities
Vulnerable Software
Apache:  >> Http Server  Security Vulnerabilities
The Apache 1.3.x HTTP server for Windows platforms allows remote attackers to list directory contents by requesting a URL containing a large number of / characters.
CVSS Score
5.0
EPSS Score
0.464
Published
2000-05-31
Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the printenv CGI (printenv.pl), which does not encode its output, (2) pages generated by the ap_send_error_response function such as a default 404, which does not add an explicit charset, or (3) various messages that are generated by certain Apache modules or core code. NOTE: the printenv issue might still exist for web browsers that can render text/plain content types as HTML, such as Internet Explorer, but CVE regards this as a design limitation of those browsers, not Apache. The printenv.pl/acuparam vector, discloser on 20070724, is one such variant.
CVSS Score
4.3
EPSS Score
0.057
Published
2000-02-01
mod_proxy in Apache 1.2.5 and earlier allows remote attackers to cause a denial of service via malformed FTP commands, which causes Apache to dump core.
CVSS Score
10.0
EPSS Score
0.017
Published
1999-12-31
The Apache web server for Win32 may provide access to restricted files when a . (dot) is appended to a requested URL.
CVSS Score
5.0
EPSS Score
0.013
Published
1999-12-12
guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
CVSS Score
7.5
EPSS Score
0.886
Published
1999-09-13
Apache allows remote attackers to conduct a denial of service via a large number of MIME headers.
CVSS Score
10.0
EPSS Score
0.05
Published
1999-09-03
Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files.
CVSS Score
5.0
EPSS Score
0.031
Published
1999-08-20
Multiple buffer overflows in smbvalid/smbval SMB authentication library, as used in Apache::AuthenSmb and possibly other modules, allows remote attackers to execute arbitrary commands via (1) a long username, (2) a long password, and (3) other unspecified methods.
CVSS Score
10.0
EPSS Score
0.004
Published
1999-06-06
A possible interaction between Apple MacOS X release 1.0 and Apache HTTP server allows remote attackers to cause a denial of service (crash) via a flood of HTTP GET requests to CGI programs, which generates a large number of processes.
CVSS Score
5.0
EPSS Score
0.138
Published
1999-06-03
A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
CVSS Score
5.0
EPSS Score
0.172
Published
1999-01-17


Contact Us

Shodan ® - All rights reserved