Vulnerabilities > MOD Security
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2007-03-08 | CVE-2007-1359 | Unspecified vulnerability in MOD Security MOD Security Interpretation conflict in ModSecurity (mod_security) 2.1.0 and earlier allows remote attackers to bypass request rules via application/x-www-form-urlencoded POST data that contains an ASCIIZ (0x00) byte, which mod_security treats as a terminator even though it is still processed as normal data by some HTTP parsers including PHP 5.2.0, and possibly parsers in Perl, and Python. network mod-security | 6.8 |
2004-12-31 | CVE-2004-1765 | Buffer Overflow vulnerability in MOD Security MOD Security 1.7.4 Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests. | 7.5 |
2003-12-31 | CVE-2003-1171 | Unspecified vulnerability in MOD Security MOD Security 1.7/1.7.1 Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data. | 7.5 |