Show filters
486 Total Results
Displaying 201-210 of 486
Sort by:
Attacker Value
Unknown
CVE-2015-2808
Disclosure Date: April 01, 2015 (last updated October 05, 2023)
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
0
Attacker Value
Unknown
CVE-2015-0228
Disclosure Date: March 08, 2015 (last updated October 05, 2023)
The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
0
Attacker Value
Unknown
CVE-2014-8109
Disclosure Date: December 29, 2014 (last updated October 05, 2023)
mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.
0
Attacker Value
Unknown
CVE-2014-3583
Disclosure Date: December 15, 2014 (last updated October 05, 2023)
The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers.
0
Attacker Value
Unknown
CVE-2014-3581
Disclosure Date: October 10, 2014 (last updated October 05, 2023)
The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.
0
Attacker Value
Unknown
CVE-2014-7226
Disclosure Date: October 10, 2014 (last updated October 05, 2023)
The file comment feature in Rejetto HTTP File Server (hfs) 2.3c and earlier allows remote attackers to execute arbitrary code by uploading a file with certain invalid UTF-8 byte sequences that are interpreted as executable macro symbols.
0
Attacker Value
Unknown
CVE-2014-6287
Disclosure Date: October 07, 2014 (last updated November 25, 2024)
The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.
0
Attacker Value
Unknown
CVE-2014-0117
Disclosure Date: July 20, 2014 (last updated October 05, 2023)
The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
0
Attacker Value
Unknown
CVE-2014-0118
Disclosure Date: July 20, 2014 (last updated October 05, 2023)
The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
0
Attacker Value
Unknown
CVE-2014-0226
Disclosure Date: July 20, 2014 (last updated October 05, 2023)
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
0