Search CVE reports


Toggle filters

301 – 310 of 315 results


CVE-2005-2088

Medium priority
Fixed

The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request...

2 affected packages

apache, apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache
apache2
Show less packages

CVE-2005-1344

Medium priority
Fixed

Buffer overflow in htdigest in Apache 2.0.52 may allow attackers to execute arbitrary code via a long realm argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors...

2 affected packages

apache, apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache
apache2
Show less packages

CVE-2005-0088

Medium priority
Fixed

The publisher handler for mod_python 2.7.8 and earlier allows remote attackers to obtain access to restricted objects via a crafted URL.

2 affected packages

libapache-mod-python, libapache2-mod-python

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libapache-mod-python
libapache2-mod-python
Show less packages

CVE-2004-0942

Medium priority
Fixed

Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2004-2680

Medium priority
Fixed

mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.

1 affected package

libapache2-mod-python

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libapache2-mod-python
Show less packages

CVE-2004-0811

Medium priority
Fixed

Unknown vulnerability in Apache 2.0.51 prevents "the merging of the Satisfy directive," which could allow attackers to obtain access to restricted resources contrary to the specified authentication configuration.

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2004-0885

Medium priority
Fixed

The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the...

2 affected packages

apache2, libapache-mod-ssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
libapache-mod-ssl
Show less packages

CVE-2004-0786

Medium priority
Fixed

The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2004-0751

Medium priority
Fixed

The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2004-0748

Medium priority
Fixed

mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages