Mod Security » Mod Security : Security Vulnerabilities, CVEs,
Interpretation conflict in ModSecurity (mod_security) 2.1.0 and earlier allows remote attackers to bypass request rules via application/x-www-form-urlencoded POST data that contains an ASCIIZ (0x00) byte, which mod_security treats as a terminator even though it is still processed as normal data by some HTTP parsers including PHP 5.2.0, and possibly parsers in Perl, and Python.
Max CVSS
6.8
EPSS Score
15.30%
Published
2007-03-08
Updated
2017-07-29
Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests.
Max CVSS
7.5
EPSS Score
10.58%
Published
2004-12-31
Updated
2017-07-11
Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.
Max CVSS
7.5
EPSS Score
6.28%
Published
2003-12-31
Updated
2017-07-11
3 vulnerabilities found