Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache http server 1.3.23 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-1418
Apache HTTP Server 1.3.22 up to and including 1.3.27 on OpenBSD allows remote malicious users to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).
Apache Http Server 1.3.22
Apache Http Server 1.3.23
Apache Http Server 1.3.24
Apache Http Server 1.3.25
Apache Http Server 1.3.26
Apache Http Server 1.3.27
2 Github repositories
NA
CVE-2002-1233
A regression error in the Debian distributions of the apache-ssl package (prior to 1.3.9 on Debian 2.2, and prior to 1.3.26 on Debian 3.0), for Apache 1.3.27 and previous versions, allows local users to read or modify the Apache password file via a symlink attack on temporary fil...
Apache Http Server 1.3.17
Apache Http Server 1.3.18
Apache Http Server 1.3.19
Apache Http Server 1.3.20
Apache Http Server 1.3.22
Apache Http Server 1.3.23
Apache Http Server 1.3.24
Apache Http Server 1.3.25
Apache Http Server 1.3.26
Apache Http Server 1.3.27
NA
CVE-2002-2103
Apache prior to 1.3.24, when writing to the log file, records a spoofed hostname from the reverse lookup of an IP address, even when a double-reverse lookup fails, which allows remote malicious users to hide the original source of activities.
Apache Http Server 1.3.9
Apache Http Server 1.3.11
Apache Http Server 1.3.12
Apache Http Server 1.3.13
Apache Http Server 1.3.14
Apache Http Server 1.3.15
Apache Http Server 1.3.16
Apache Http Server 1.3.17
Apache Http Server 1.3.18
Apache Http Server 1.3.19
Apache Http Server 1.3.20
Apache Http Server 1.3.22
NA
CVE-2002-1658
Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow malicious users to execute arbitrary code via a long user argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation ...
Apache Http Server 1.3.1
Apache Http Server 1.3.3
Apache Http Server 1.3.4
Apache Http Server 1.3.6
Apache Http Server 1.3.9
Apache Http Server 1.3.11
Apache Http Server 1.3.12
Apache Http Server 1.3.14
Apache Http Server 1.3.17
Apache Http Server 1.3.18
Apache Http Server 1.3.19
Apache Http Server 1.3.20
NA
CVE-2003-0993
mod_access in Apache 1.3 prior to 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote malicious users to bypass intended access restrictions.
Apache Http Server 1.3
Apache Http Server 1.3.1
Apache Http Server 1.3.3
Apache Http Server 1.3.4
Apache Http Server 1.3.6
Apache Http Server 1.3.7
Apache Http Server 1.3.9
Apache Http Server 1.3.11
Apache Http Server 1.3.12
Apache Http Server 1.3.14
Apache Http Server 1.3.17
Apache Http Server 1.3.18
NA
CVE-2002-0843
Buffer overflows in the ApacheBench benchmark support program (ab.c) in Apache prior to 1.3.27, and Apache 2.x prior to 2.0.43, allow a malicious web server to cause a denial of service and possibly execute arbitrary code via a long response.
Apache Http Server 1.3
Apache Http Server 1.3.1
Apache Http Server 1.3.3
Apache Http Server 1.3.4
Apache Http Server 1.3.6
Apache Http Server 1.3.9
Apache Http Server 1.3.11
Apache Http Server 1.3.12
Apache Http Server 1.3.14
Apache Http Server 1.3.17
Apache Http Server 1.3.18
Apache Http Server 1.3.19
NA
CVE-2002-2272
Tomcat 4.0 up to and including 4.1.12, using mod_jk 1.2.1 module on Apache 1.3 up to and including 1.3.27, allows remote malicious users to cause a denial of service (desynchronized communications) via an HTTP GET request with a Transfer-Encoding chunked field with invalid values...
Apache Http Server 1.3
Apache Http Server 1.3.0
Apache Http Server 1.3.1
Apache Http Server 1.3.2
Apache Http Server 1.3.10
Apache Http Server 1.3.11
Apache Http Server 1.3.12
Apache Http Server 1.3.13
Apache Http Server 1.3.14
Apache Http Server 1.3.15
Apache Http Server 1.3.16
Apache Http Server 1.3.17
1 EDB exploit
NA
CVE-2003-0542
Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache prior to 1.3.29 allow malicious users to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.
Apache Http Server 1.3
Apache Http Server 1.3.1
Apache Http Server 1.3.3
Apache Http Server 1.3.4
Apache Http Server 1.3.6
Apache Http Server 1.3.9
Apache Http Server 1.3.11
Apache Http Server 1.3.12
Apache Http Server 1.3.14
Apache Http Server 1.3.17
Apache Http Server 1.3.18
Apache Http Server 1.3.19
NA
CVE-2010-0010
Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server prior to 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size th...
Apache Http Server
Apache Http Server 0.8.11
Apache Http Server 0.8.14
Apache Http Server 1.0
Apache Http Server 1.0.3
Apache Http Server 1.0.5
Apache Http Server 1.1
Apache Http Server 1.2
Apache Http Server 1.2.4
Apache Http Server 1.2.5
Apache Http Server 1.2.6
Apache Http Server 1.3
NA
CVE-2004-0263
PHP 4.3.4 and previous versions in Apache 1.x and 2.x (mod_php) can leak global variables between virtual hosts that are handled by the same Apache child process but have different settings, which could allow remote malicious users to obtain sensitive information.
Apache Http Server 1.0
Apache Http Server 1.0.2
Apache Http Server 1.0.3
Apache Http Server 1.0.5
Apache Http Server 1.1
Apache Http Server 1.1.1
Apache Http Server 1.2
Apache Http Server 1.2.5
Apache Http Server 1.3
Apache Http Server 1.3.1
Apache Http Server 1.3.3
Apache Http Server 1.3.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
local
IMAP
CVE-2024-8504
CVE-2024-42327
CVE-2024-11904
CVE-2024-47107
CVE-2024-53143
XML injection
CVE-2024-54750
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »