[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197798 Download | Alert*

The host is installed with Apache HTTP Server 2.4.41 through 2.4.46 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle specially crafted requests using both Content-Length and Transfer-Encoding headers. Successful exploitation could allow unprivileged attackers to cause mod_proxy_http to crash, leading to a denial of servi ...

The host is installed with Apache HTTP Server 2.4.41 through 2.4.46 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted Digest nonce. Successful exploitation could allow attackers to cause a stack overflow in mod_auth_digest.

Apache HTTP Server 2.4.39 to 2.4.46: Unexpected URL matching with MergeSlashes OFF.

The host is installed with Apache HTTP Server 2.4.6 through 2.4.46 and is prone to a HTTP request smuggling vulnerability. A flaw is present in the application, which fails to properly handle an issue in mod_proxy_wstunnel. Successful exploitation could allow attackers to cause subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possi ...

The host is installed with Apache HTTP Server 2.4.6 through 2.4.46 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle an issue in the HTTP/2 protocol handler. Successful exploitation could allow attackers to cause denial of service on the server.

The host is installed with Apache HTTP Server 2.4.20 through 2.4.43 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle a specially crafted value for the Cache-Digest header in a HTTP/2 request. Successful exploitation could allow attackers to cause a crash.

The host is installed with Apache HTTP Server 2.4.20 through 2.4.43 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to properly handle logging statements made on the wrong connections. Successful exploitation could allow attackers to cause a denial of service attack by concurrent use of memory pools.

The host is installed with Apache HTTP Server 2.4.32 through 2.4.43s5 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an issue in mod_proxy_uwsgi. Successful exploitation could allow attackers to cause information disclosure and possibly remote code executions.

The host is installed with Apache HTTP Server 2.4.0 before 2.4.24 and is prone to an IP address spoofing vulnerability. A flaw is present in the application, which fails to properly handle an issue in configurations using proxying with mod_remoteip and certain mod_rewrite rules. Successful exploitation could allow an attacker to spoof their IP address for logging and PHP scripts.

The host is installed with Apache HTTP Server 2.4.49 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle a issue in path normalization. Successful exploitation could allow attackers to use a path traversal attack to map URLs to files outside the expected document root.


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   19779

© SecPod Technologies