Show filters
486 Total Results
Displaying 241-250 of 486
Sort by:
Attacker Value
Unknown
CVE-2010-1623
Disclosure Date: October 04, 2010 (last updated October 04, 2023)
Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
0
Attacker Value
Unknown
CVE-2010-2791
Disclosure Date: August 05, 2010 (last updated November 08, 2023)
mod_proxy in httpd in Apache HTTP Server 2.2.9, when running on Unix, does not close the backend connection if a timeout occurs when reading a response from a persistent connection, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request. NOTE: this is the same issue as CVE-2010-2068, but for a different OS and set of affected versions.
0
Attacker Value
Unknown
CVE-2010-1452
Disclosure Date: July 28, 2010 (last updated November 02, 2023)
The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
0
Attacker Value
Unknown
CVE-2010-2435
Disclosure Date: June 24, 2010 (last updated October 04, 2023)
Weborf HTTP Server 0.12.1 and earlier allows remote attackers to cause a denial of service (crash) via Unicode characters in a Connection HTTP header, and possibly other headers.
0
Attacker Value
Unknown
CVE-2010-2068
Disclosure Date: June 18, 2010 (last updated October 04, 2023)
mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
0
Attacker Value
Unknown
CVE-2010-1151
Disclosure Date: April 20, 2010 (last updated October 04, 2023)
Race condition in the mod_auth_shadow module for the Apache HTTP Server allows remote attackers to bypass authentication, and read and possibly modify data, via vectors related to improper interaction with an external helper application for validation of credentials.
0
Attacker Value
Unknown
CVE-2010-0425
Disclosure Date: March 05, 2010 (last updated October 04, 2023)
modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
0
Attacker Value
Unknown
CVE-2010-0434
Disclosure Date: March 05, 2010 (last updated October 04, 2023)
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
0
Attacker Value
Unknown
CVE-2010-0408
Disclosure Date: March 05, 2010 (last updated November 02, 2023)
The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
0
Attacker Value
Unknown
CVE-2003-1581
Disclosure Date: February 05, 2010 (last updated October 04, 2023)
The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS sequences, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
0