Max CVSS | 5.0 | Min CVSS | 4.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2012-0053 | 4.3 |
protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors i
|
14-09-2022 - 19:51 | 28-01-2012 - 04:05 | |
CVE-2011-4317 | 4.3 |
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern ma
|
06-06-2021 - 11:15 | 30-11-2011 - 04:05 | |
CVE-2011-3368 | 5.0 |
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, wh
|
06-06-2021 - 11:15 | 05-10-2011 - 22:55 | |
CVE-2013-5095 | 4.3 |
Cross-site scripting (XSS) vulnerability in the web-based interface in Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors,
|
12-09-2013 - 03:37 | 16-08-2013 - 13:57 | |
CVE-2013-5097 | 4.0 |
Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly restrict access to the list of user accounts and their MD5 password hashes, which makes it easier for remote authenticated users to obtain s
|
12-09-2013 - 03:37 | 16-08-2013 - 14:01 | |
CVE-2013-5096 | 4.0 |
Juniper Junos Space before 13.1R1.6, as used on the JA1500 appliance and in other contexts, does not properly implement role-based access control, which allows remote authenticated users to modify the configuration by leveraging the read-only privile
|
12-09-2013 - 03:37 | 16-08-2013 - 14:01 |