Search CVE reports


Toggle filters

211 – 220 of 318 results


CVE-2013-1896

Medium priority
Fixed

mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI...

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2013-1862

Low priority
Fixed

mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an...

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2013-1048

Medium priority
Fixed

The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2...

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2012-4558

Medium priority
Fixed

Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x...

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2012-3499

Medium priority
Fixed

Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in...

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2012-6702

Medium priority

Some fixes available 5 of 107

Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.

32 affected packages

ayttm, apache2, cmake, ghostscript, paraview...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ayttm Not in release Not in release Not in release Not in release
apache2 Not affected Not affected Not affected Not affected
cmake Not affected Not affected Not affected Not affected
ghostscript Not affected Not affected Not affected Not affected
paraview Not affected Not affected Not affected Not affected
libparagui1.1 Not in release Not in release Not in release Not in release
audacity Not affected Not affected Not affected Not affected
apr-util Not affected Not affected Not affected Not affected
cableswig Not in release Not in release Not in release Not in release
cadaver Not affected Not affected Not affected Not affected
expat Not affected Not affected Not affected Not affected
xmlrpc-c Vulnerable Vulnerable Vulnerable Vulnerable
libxmltok Not affected Not affected Not affected Not affected
insighttoolkit Not in release Not in release Not in release Not in release
coin3 Not affected Not affected Not affected Not affected
gdcm Not affected Not affected Not affected Not affected
kompozer Not in release Not in release Not in release Not in release
matanza Not affected Not affected Not affected Not affected
poco Not affected Not affected Not affected Not affected
simgear Not affected Not affected Not affected Not affected
sitecopy Not in release Not affected Not affected Not affected
smart Not in release Not in release Not in release Not affected
swish-e Not affected Not affected Not affected Not affected
tdom Not affected Not affected Not affected Not affected
texlive-bin Not affected Not affected Not affected Not affected
tla Not affected Not affected Not affected Not affected
vnc4 Not in release Not in release Not in release Ignored
vtk Not in release Not in release Not in release Not in release
wbxml2 Not affected Not affected Not affected Not affected
wxwidgets2.6 Not in release Not in release Not in release Not in release
wxwidgets2.8 Not in release Not in release Not in release Not in release
xotcl Not affected Not affected Not affected Not affected
Show all 32 packages Show less packages

CVE-2012-4557

Low priority
Fixed

The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker...

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages

CVE-2012-4929

Medium priority

Some fixes available 21 of 34

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle...

6 affected packages

apache2, chromium-browser, nss, openssl, openssl098, qt4-x11

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
chromium-browser
nss
openssl
openssl098
qt4-x11
Show less packages

CVE-2012-3526

Low priority
Fixed

The reverse proxy add forward module (mod_rpaf) 0.5 and 0.6 for the Apache HTTP Server allows remote attackers to cause a denial of service (server or application crash) via multiple X-Forwarded-For headers in a request.

1 affected package

libapache2-mod-rpaf

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libapache2-mod-rpaf
Show less packages

CVE-2012-3502

Low priority
Not affected

The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require...

1 affected package

apache2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apache2
Show less packages