cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-49582,https://securityvulnerability.io/vulnerability/CVE-2023-49582,Local Users Could Access Sensitive Application Data Due to Insufficient Permissions in Apache Portable Runtime on Unix Platforms,"Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. This issue does not affect non-Unix platforms, or builds with APR_USE_SHMEM_SHMGET=1 (apr.h) Users are recommended to upgrade to APR version 1.7.5, which fixes this issue.",Apache,Apache Portable Runtime (apr),5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2024-08-26T14:03:44.588Z,0 CVE-2022-28331,https://securityvulnerability.io/vulnerability/CVE-2022-28331,Apache Portable Runtime (APR): Windows out-of-bounds write in apr_socket_sendv function,"The Apache Portable Runtime on Windows versions 1.7.0 and earlier contains a vulnerability where an integer overflow may result in writing beyond the end of a stack-based buffer during socket operations in the apr_socket_sendv() function. This flaw can potentially lead to uncontrolled memory corruption, making systems vulnerable to various forms of attacks that exploit this overflow.",Apache,Apache Portable Runtime (apr),9.8,CRITICAL,0.07749000191688538,false,,false,false,false,,,false,false,,2023-01-31T15:55:21.488Z,0 CVE-2022-25147,https://securityvulnerability.io/vulnerability/CVE-2022-25147,Apache Portable Runtime Utility (APR-util): out-of-bounds writes in the apr_base64 family of functions,"Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. ",Apache,Apache Portable Runtime Utility (apr-util),6.5,MEDIUM,0.001769999973475933,false,,false,false,false,,,false,false,,2023-01-31T15:54:51.395Z,0 CVE-2022-24963,https://securityvulnerability.io/vulnerability/CVE-2022-24963,"Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions ","An integer overflow vulnerability exists in the apr_encode functions of the Apache Portable Runtime (APR), which can lead to unauthorized memory write operations. Exploiting this vulnerability allows attackers to write beyond the allocated memory bounds, potentially leading to data corruption or a complete system compromise. Users of APR version 1.7.0 should evaluate their systems and apply necessary security measures as outlined in the vendor advisories.",Apache,Apache Portable Runtime (apr),9.8,CRITICAL,0.08449000120162964,false,,false,false,false,,,false,false,,2023-01-31T15:52:09.716Z,0 CVE-2021-35940,https://securityvulnerability.io/vulnerability/CVE-2021-35940,Regression of CVE-2017-12613,"An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The fix for this issue was not carried forward to the APR 1.7.x branch, and hence version 1.7.0 regressed compared to 1.6.3 and is vulnerable to the same issue.",Apache,Apache Portable Runtime (apr),7.1,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2021-08-23T10:00:10.000Z,0 CVE-2017-12613,https://securityvulnerability.io/vulnerability/CVE-2017-12613,,"When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.",Apache,Apache Portable Runtime,7.1,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2017-10-24T01:00:00.000Z,0 CVE-2017-12618,https://securityvulnerability.io/vulnerability/CVE-2017-12618,,"Apache Portable Runtime Utility (APR-util) 1.6.0 and prior fail to validate the integrity of SDBM database files used by apr_sdbm*() functions, resulting in a possible out of bound read access. A local user with write access to the database can make a program or process using these functions crash, and cause a denial of service.",Apache,Apache Portable Runtime,4.7,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2017-10-24T01:00:00.000Z,0 CVE-2012-0840,https://securityvulnerability.io/vulnerability/CVE-2012-0840,,"tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",Apache,Portable Runtime,,,0.016519999131560326,false,,false,false,false,,,false,false,,2012-02-10T19:00:00.000Z,0 CVE-2011-0419,https://securityvulnerability.io/vulnerability/CVE-2011-0419,,"Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.",Apache,Portable Runtime,,,0.9666799902915955,false,,false,false,false,,,false,false,,2011-05-16T17:00:00.000Z,0 CVE-2009-2699,https://securityvulnerability.io/vulnerability/CVE-2009-2699,,"The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.",Apache,"Http Server,Portable Runtime",7.5,HIGH,0.4817900061607361,false,,false,false,false,,,false,false,,2009-10-13T10:00:00.000Z,0 CVE-2009-2412,https://securityvulnerability.io/vulnerability/CVE-2009-2412,,"Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.",Apache,"Apr-util,Portable Runtime",,,0.11242000013589859,false,,false,false,false,,,false,false,,2009-08-06T15:00:00.000Z,0