[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Apache HTTP Server 2.4.17 through 2.4.37 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the HTTP/2 (mod_http2) connections. Successful exploitation could allow attackers to cause a denial of service for HTTP/2 connections.

The host is installed with Apache HTTP Server version 2.4.37 with OpenSSL version 1.1.1 or later and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the client negotiations by mod_ssl. Successful exploitation could allow attackers to cause the application to enter into an infinite loop.

The host is installed with Apache 2.4.x before 2.4.2 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a zero-length directory name in the LD_LIBRARY_PATH. Successful exploitation could allow remote attackers to search the current directory for DSO's.

The host is installed with Apache HTTP Server before 2.4.5 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails by proceeding with save operations for a session without considering the dirty flag. Successful exploitation could allow remote attackers to an unspecified impact and remote attack vectors.

The host is installed with Apache HTTP Server 2.4.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle enablement of caching forward proxy. Successful exploitation could allow remote HTTP servers to cause denial of service (NULL pointer dereference and daemon crash).

The host is installed with Apache HTTP Server 2.2.x through 2.2.27 or 2.4.x through 2.4.10 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle a crafted data. Successful exploitation could allow remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer c ...

The host is installed with Apache HTTP Server 2.2.x through 2.2.26 or 2.4.x before 2.4.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly remove whitespace characters from CDATA sections. Successful exploitation could allow remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.

The host is installed with Apache HTTP Server 2.2.x through 2.2.26 or 2.4.x before 2.4.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted cookie during truncation. Successful exploitation could allow remote attackers to cause a denial of service (segmentation fault and daemon crash).

The host is installed with Apache HTTP Server 2.4.x from 2.4.6 through 2.4.9 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails when a reverse proxy is enabled. Successful exploitation could allow remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.

The host is installed with Apache HTTP Server 2.2.x through 2.2.27 or 2.4.x before 2.4.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails when request body decompression is enabled. Successful exploitation could allow remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1502

© SecPod Technologies