Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache http server 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1268
Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote malicious users to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
Apache Http Server
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
Debian Debian Linux 3.1
NA
CVE-2012-0031
scoreboard.c in the Apache HTTP Server 2.2.21 and previous versions might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading t...
Apache Http Server
Debian Debian Linux 5.0
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Opensuse Opensuse 11.4
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Server 10
Redhat Jboss Enterprise Web Server 1.0.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Storage 2.0
Redhat Enterprise Linux Eus 6.2
1 EDB exploit
8.1
CVSSv3
CVE-2017-12617
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a...
Apache Tomcat 7.0.2
Apache Tomcat 8.0.4
Apache Tomcat 8.0.10
Apache Tomcat 7.0.49
Apache Tomcat 8.0.30
Apache Tomcat 8.0.44
Apache Tomcat 7.0.12
Apache Tomcat 7.0.62
Apache Tomcat 8.0.17
Apache Tomcat 7.0.20
Apache Tomcat 8.0.7
Apache Tomcat 7.0.34
Apache Tomcat 8.0.26
Apache Tomcat 7.0.58
Apache Tomcat 8.5.2
Apache Tomcat 7.0.8
Apache Tomcat 7.0.55
Apache Tomcat 8.5.9
Apache Tomcat 8.5.4
Apache Tomcat 7.0.1
Apache Tomcat 7.0.5
Apache Tomcat 8.0.40
2 EDB exploits
21 Github repositories
8.1
CVSSv3
CVE-2017-12615
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and a...
Apache Tomcat 7.0
Apache Tomcat 7.0.0
Apache Tomcat 7.0.1
Apache Tomcat 7.0.2
Apache Tomcat 7.0.3
Apache Tomcat 7.0.4
Apache Tomcat 7.0.5
Apache Tomcat 7.0.6
Apache Tomcat 7.0.7
Apache Tomcat 7.0.8
Apache Tomcat 7.0.9
Apache Tomcat 7.0.10
Apache Tomcat 7.0.11
Apache Tomcat 7.0.12
Apache Tomcat 7.0.13
Apache Tomcat 7.0.14
Apache Tomcat 7.0.15
Apache Tomcat 7.0.16
Apache Tomcat 7.0.17
Apache Tomcat 7.0.18
Apache Tomcat 7.0.19
Apache Tomcat 7.0.20
1 EDB exploit
17 Github repositories
1 Article
7.5
CVSSv3
CVE-2017-7686
Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where...
Apache Ignite 1.6.0
Apache Ignite 1.4.0
Apache Ignite 1.3.0
Apache Ignite 1.2.0
Apache Ignite 1.1.0
Apache Ignite 1.9.0
Apache Ignite 1.7.0
Apache Ignite 1.5.0
Apache Ignite 1.0.0
Apache Ignite 2.0.0
Apache Ignite 1.8.0
7.5
CVSSv3
CVE-2016-3083
Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive prior to 1.2.2 and 2.0.x prior to 2.0.1 doesn't seem t...
Apache Hive 0.13.1
Apache Hive 1.1.1
Apache Hive 1.1.0
Apache Hive 1.0.0
Apache Hive 1.2.0
Apache Hive 0.14.0
Apache Hive 1.2.1
Apache Hive 1.0.1
Apache Hive 0.13.0
NA
CVE-2010-1632
Apache Axis2 prior to 1.5.2, as used in IBM WebSphere Application Server (WAS) 7.0 up to and including 7.0.0.12, IBM Feature Pack for Web Services 6.1.0.9 up to and including 6.1.0.32, IBM Feature Pack for Web 2.0 1.0.1.0, Apache Synapse, Apache ODE, Apache Tuscany, Apache Geroni...
Apache Axis2 1.4
Apache Axis2 1.3
Apache Axis2 1.4.1
Apache Axis2 1.5
Apache Axis2
7.8
CVSSv3
CVE-2004-0940
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Openpkg Openpkg 2.0
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Apache Http Server
Slackware Slackware Linux 9.0
Slackware Slackware Linux 8.1
Slackware Slackware Linux 10.0
Hp Hp-ux 11.11
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Slackware Slackware Linux 8.0
Suse Suse Linux 8.2
Slackware Slackware Linux 9.1
Slackware Slackware Linux Current
Suse Suse Linux 8.0
Trustix Secure Linux 1.5
Hp Hp-ux 11.00
Hp Hp-ux 11.22
Suse Suse Linux 9.1
Hp Hp-ux 11.20
Suse Suse Linux 8.1
2 EDB exploits
NA
CVE-2004-0809
The mod_dav module in Apache 2.0.50 and previous versions allows remote malicious users to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
Apache Http Server
Hp Secure Web Server For Tru64 5.1
Hp Hp-ux 11.11
Trustix Secure Linux 2.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux 3.0
Mandrakesoft Mandrake Linux 9.2
Hp Secure Web Server For Tru64 5.0 A
Hp Secure Web Server For Tru64 6.3.0
Hp Hp-ux 11.00
Hp Hp-ux 11.23
Hp Hp-ux 11.22
Hp Secure Web Server For Tru64 5.8.1
Turbolinux Turbolinux Home
Hp Secure Web Server For Tru64 4.0 F
Gentoo Linux 1.4
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2.1
Hp Secure Web Server For Tru64 5.1 A
Hp Secure Web Server For Tru64 5.9.1
Hp Secure Web Server For Tru64 5.9.2
Hp Secure Web Server For Tru64 4.0 G
NA
CVE-2013-4365
Heap-based buffer overflow in the fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module prior to 2.3.9 for the Apache HTTP Server allows remote malicious users to have an unspecified impact via unknown vectors.
Apache Mod Fcgid
Debian Debian Linux 7.0
Debian Debian Linux 6.0
Opensuse Opensuse 12.3
Suse Linux Enterprise Software Development Kit 11
Opensuse Opensuse 11.4
Opensuse Opensuse 12.2
Suse Cloud 2.0
Suse Cloud 1.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
injection
CVE-2024-30983
CVE-2023-4235
CVE-2024-21338
privilege
encryption
CVE-2023-4232
CVE-2024-31497
CVE-2024-32341
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »