Vulnerabilities > Apache > Http Server > 1.3.12

DATE CVE VULNERABILITY TITLE RISK
2002-12-31 CVE-2002-2103 Unspecified vulnerability in Apache Http Server
Apache before 1.3.24, when writing to the log file, records a spoofed hostname from the reverse lookup of an IP address, even when a double-reverse lookup fails, which allows remote attackers to hide the original source of activities.
network
low complexity
apache
5.0
2002-12-31 CVE-2002-2029 Remote File Disclosure vulnerability in Apache Win32 PHP.EXE
PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
network
low complexity
apache
7.5
2002-12-31 CVE-2002-1658 Buffer Overflow vulnerability in Multiple Apache HTDigest
Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow attackers to execute arbitrary code via a long user argument.
local
low complexity
apache
4.6
2001-12-31 CVE-2001-1534 Session Fixation vulnerability in Apache Http Server
mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication.
local
low complexity
apache CWE-384
2.1
2001-11-28 CVE-2001-1449 Remote Security vulnerability in Apache
The default installation of Apache before 1.3.19 on Mandrake Linux 7.1 through 8.0 and Linux Corporate Server 1.0.1 allows remote attackers to list the directory index of arbitrary web directories.
network
low complexity
apache mandrakesoft
7.5
2000-11-14 CVE-2000-0869 The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary directories via the PROPFIND HTTP request method.
network
low complexity
apache suse
5.0
2000-11-14 CVE-2000-0868 The default configuration of Apache 1.3.12 in SuSE Linux 6.4 allows remote attackers to read source code for CGI scripts by replacing the /cgi-bin/ in the requested URL with /cgi-bin-sdb/.
network
low complexity
apache suse
5.0