Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache http server 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1268
Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote malicious users to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
Apache Http Server
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
Debian Debian Linux 3.1
NA
CVE-2005-2088
The Apache HTTP server prior to 1.3.34, and 2.0.x prior to 2.0.55, when acting as an HTTP proxy, allows remote malicious users to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chu...
Apache Http Server
Debian Debian Linux 3.1
Debian Debian Linux 3.0
7.8
CVSSv3
CVE-2004-0940
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Openpkg Openpkg 2.0
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Apache Http Server
Slackware Slackware Linux 9.0
Slackware Slackware Linux 8.1
Slackware Slackware Linux 10.0
Hp Hp-ux 11.11
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Slackware Slackware Linux 8.0
Suse Suse Linux 8.2
Slackware Slackware Linux 9.1
Slackware Slackware Linux Current
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Hp Hp-ux 11.00
Hp Hp-ux 11.22
Suse Suse Linux 9.1
Hp Hp-ux 11.20
Suse Suse Linux 8.1
2 EDB exploits
7.5
CVSSv3
CVE-2004-0079
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
NA
CVE-2004-0081
OpenSSL 0.9.6 prior to 0.9.6d does not properly handle unknown message types, which allows remote malicious users to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1 \\(3.005\\)
Cisco Firewall Services Module
Cisco Firewall Services Module 1.1.2
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Hp Aaa Server
Cisco Ciscoworks Common Management Foundation 2.1
Cisco Ciscoworks Common Services 2.2
Avaya Sg208 4.4
Avaya Sg5 4.2
Avaya Sg5 4.3
Freebsd Freebsd 5.1
Hp Hp-ux 8.05
Openbsd Openbsd 3.3
Redhat Linux 8.0
Sco Openserver 5.0.6
Avaya Sg203 4.4
Avaya Sg208
Freebsd Freebsd 4.8
NA
CVE-2004-0112
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshak...
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
NA
CVE-2004-0263
PHP 4.3.4 and previous versions in Apache 1.x and 2.x (mod_php) can leak global variables between virtual hosts that are handled by the same Apache child process but have different settings, which could allow remote malicious users to obtain sensitive information.
Apache Http Server 1.0.3
Apache Http Server 1.0.5
Apache Http Server 1.3.11
Apache Http Server 1.3.12
Apache Http Server 1.2
Apache Http Server 1.2.5
Apache Http Server 1.3.18
Apache Http Server 1.3.19
Apache Http Server 1.3.20
Apache Http Server 1.3.28
Apache Http Server 1.3.29
Apache Http Server 2.0.28
Apache Http Server 2.0.41
Apache Http Server 2.0.42
Apache Http Server 2.0.9
Ibm Http Server 1.3.19
Apache Http Server 1.3.24
Apache Http Server 1.3.25
Apache Http Server 1.3.6
Apache Http Server 1.3.7
Apache Http Server 2.0.36
Apache Http Server 2.0.37
NA
CVE-2004-0751
The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote malicious users to cause a denial of service (segmentation fault).
Apache Http Server
1 EDB exploit
NA
CVE-2004-0809
The mod_dav module in Apache 2.0.50 and previous versions allows remote malicious users to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
Apache Http Server
Hp Secure Web Server For Tru64 5.1
Hp Hp-ux 11.11
Trustix Secure Linux 2.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux 3.0
Mandrakesoft Mandrake Linux 9.2
Hp Secure Web Server For Tru64 5.0 A
Hp Secure Web Server For Tru64 6.3.0
Hp Hp-ux 11.00
Hp Hp-ux 11.23
Hp Hp-ux 11.22
Hp Secure Web Server For Tru64 5.8.1
Turbolinux Turbolinux Home
Hp Secure Web Server For Tru64 4.0 F
Gentoo Linux 1.4
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
Hp Secure Web Server For Tru64 5.1 A
Hp Secure Web Server For Tru64 5.9.1
Hp Secure Web Server For Tru64 5.9.2
Hp Secure Web Server For Tru64 4.0 G
NA
CVE-2004-0492
Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote malicious users to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data ...
Hp Webproxy 2.0
Hp Virtualvault 11.0.4
Apache Http Server 1.3.27
Ibm Http Server 1.3.28
Apache Http Server 1.3.28
Apache Http Server 1.3.31
Hp Webproxy 2.1
Ibm Http Server 1.3.26.1
Apache Http Server 1.3.26
Apache Http Server 1.3.29
Sgi Propack 2.4
Ibm Http Server 1.3.26
Ibm Http Server 1.3.26.2
Hp Vvos 11.04
Openbsd Openbsd 3.5
Openbsd Openbsd
Openbsd Openbsd 3.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »