Filtered by vendor Mod Security
Subscribe
Total
3 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2007-1359 | 1 Mod Security | 1 Mod Security | 2024-11-21 | 6.8 MEDIUM | N/A |
Interpretation conflict in ModSecurity (mod_security) 2.1.0 and earlier allows remote attackers to bypass request rules via application/x-www-form-urlencoded POST data that contains an ASCIIZ (0x00) byte, which mod_security treats as a terminator even though it is still processed as normal data by some HTTP parsers including PHP 5.2.0, and possibly parsers in Perl, and Python. | |||||
CVE-2004-1765 | 1 Mod Security | 1 Mod Security | 2024-11-20 | 7.5 HIGH | N/A |
Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests. | |||||
CVE-2003-1171 | 1 Mod Security | 1 Mod Security | 2024-11-20 | 7.5 HIGH | N/A |
Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data. |