Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache http server 2.2 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2006-3918
http_protocol.c in (1) IBM HTTP Server 6.0 prior to 6.0.2.13 and 6.1 prior to 6.1.0.1, and (2) Apache HTTP Server 1.3 prior to 1.3.35, 2.0 prior to 2.0.58, and 2.2 prior to 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error messa...
Apache Http Server
Debian Debian Linux 3.1
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Redhat Enterprise Linux Server 2.0
Redhat Enterprise Linux Workstation 2.0
1 EDB exploit
4.3
CVSSv2
CVE-2008-2939
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and previous versions, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and previous versions 2.2 versions, allows remote malicious users to inject arbitrary web sc...
Apache Http Server
Canonical Ubuntu Linux 6.06
Opensuse Opensuse 10.2
Canonical Ubuntu Linux 7.10
Apple Mac Os X
Opensuse Opensuse 11.0
Opensuse Opensuse 10.3
Canonical Ubuntu Linux 8.04
4.6
CVSSv2
CVE-2012-0031
scoreboard.c in the Apache HTTP Server 2.2.21 and previous versions might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading t...
Apache Http Server
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Opensuse Opensuse 11.4
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Server 10
Redhat Jboss Enterprise Web Server 1.0.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Storage 2.0
Redhat Enterprise Linux Eus 6.2
1 EDB exploit
4.3
CVSSv2
CVE-2012-0053
protocol.c in the Apache HTTP Server 2.2.x up to and including 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote malicious users to obtain the values of HTTPOnly cookies via vectors involving a (...
Apache Http Server
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Opensuse Opensuse 11.4
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Server 10
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Storage 2.0
Redhat Enterprise Linux Eus 6.2
Redhat Jboss Enterprise Web Server 1.0.0
1 EDB exploit
3 Github repositories
6.9
CVSSv2
CVE-2004-0940
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Openpkg Openpkg 2.0
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Apache Http Server
Slackware Slackware Linux 9.0
Slackware Slackware Linux 8.1
Slackware Slackware Linux 10.0
Hp Hp-ux 11.11
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Slackware Slackware Linux 8.0
Suse Suse Linux 8.2
Slackware Slackware Linux 9.1
Slackware Slackware Linux Current
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Hp Hp-ux 11.00
Hp Hp-ux 11.22
Suse Suse Linux 9.1
Hp Hp-ux 11.20
Suse Suse Linux 8.1
2 EDB exploits
7.5
CVSSv2
CVE-2002-0656
Buffer overflows in OpenSSL 0.9.6d and previous versions, and 0.9.7-beta2 and previous versions, allow remote malicious users to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3.
Oracle Http Server 9.0.1
Oracle Corporate Time Outlook Connector 3.1
Oracle Corporate Time Outlook Connector 3.1.2
Openssl Openssl 0.9.3
Openssl Openssl 0.9.7
Oracle Application Server
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.4
Oracle Http Server 9.2.0
Openssl Openssl 0.9.5a
Oracle Corporate Time Outlook Connector 3.3
Openssl Openssl 0.9.6b
Oracle Application Server 1.0.2.1s
Openssl Openssl 0.9.6c
Oracle Application Server 1.0.2.2
Oracle Corporate Time Outlook Connector 3.1.1
Openssl Openssl 0.9.2b
Openssl Openssl 0.9.5
Oracle Application Server 1.0.2
1 EDB exploit
7.5
CVSSv2
CVE-2002-0655
OpenSSL 0.9.6d and previous versions, and 0.9.7-beta2 and previous versions, does not properly handle ASCII representations of integers on 64 bit platforms, which could allow malicious users to cause a denial of service and possibly execute arbitrary code.
Oracle Http Server 9.0.1
Oracle Corporate Time Outlook Connector 3.1
Oracle Corporate Time Outlook Connector 3.1.2
Openssl Openssl 0.9.3
Openssl Openssl 0.9.7
Oracle Application Server
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.4
Oracle Http Server 9.2.0
Openssl Openssl 0.9.5a
Oracle Corporate Time Outlook Connector 3.3
Openssl Openssl 0.9.6b
Oracle Application Server 1.0.2.1s
Openssl Openssl 0.9.6c
Oracle Application Server 1.0.2.2
Oracle Corporate Time Outlook Connector 3.1.1
Openssl Openssl 0.9.2b
Openssl Openssl 0.9.5
Oracle Application Server 1.0.2
5
CVSSv2
CVE-2002-0659
The ASN1 library in OpenSSL 0.9.6d and previous versions, and 0.9.7-beta2 and previous versions, allows remote malicious users to cause a denial of service via invalid encodings.
Oracle Http Server 9.0.1
Oracle Corporate Time Outlook Connector 3.1
Oracle Corporate Time Outlook Connector 3.1.2
Openssl Openssl 0.9.3
Openssl Openssl 0.9.7
Oracle Application Server
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.4
Oracle Http Server 9.2.0
Openssl Openssl 0.9.5a
Oracle Corporate Time Outlook Connector 3.3
Openssl Openssl 0.9.6b
Oracle Application Server 1.0.2.1s
Openssl Openssl 0.9.6c
Oracle Application Server 1.0.2.2
Oracle Corporate Time Outlook Connector 3.1.1
Openssl Openssl 0.9.2b
Openssl Openssl 0.9.5
Oracle Application Server 1.0.2
1 EDB exploit
7.8
CVSSv2
CVE-2011-3192
The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x up to and including 2.0.64, and 2.2.x up to and including 2.2.19 allows remote malicious users to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as e...
Apache Http Server
Suse Linux Enterprise Server 11
Opensuse Opensuse 11.4
Opensuse Opensuse 11.3
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Server 10
Suse Linux Enterprise Software Development Kit 11
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 11.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 10.04
2 EDB exploits
1 Nmap script
18 Github repositories
3 Articles
7.5
CVSSv2
CVE-2006-2489
Integer overflow in CGI scripts in Nagios 1.x prior to 1.4.1 and 2.x prior to 2.3.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a content length (Content-Length) HTTP header. NOTE: this is a different vulnerability th...
Nagios Nagios 2.0b5
Nagios Nagios 2.0b6
Nagios Nagios 1.0b3
Nagios Nagios 1.1
Nagios Nagios 2.1
Nagios Nagios 1.0b6
Nagios Nagios 1.0
Nagios Nagios 2.2
Nagios Nagios 2.0b2
Nagios Nagios 1.0b4
Nagios Nagios 2.0b4
Nagios Nagios 1.2
Nagios Nagios 1.0b5
Nagios Nagios 2.0b1
Nagios Nagios 2.0
Nagios Nagios 1.4
Nagios Nagios 2.0b3
Nagios Nagios 1.3
Nagios Nagios 2.0rc1
Nagios Nagios 2.3
Nagios Nagios 1.0b1
Nagios Nagios 1.0b2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »