Vulnerabilities
Vulnerable Software
Apache:  >> Mod Jk  Security Vulnerabilities
The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
CVSS Score
2.6
EPSS Score
0.058
Published
2009-04-09
Multiple stack-based buffer overflows in the legacy mod_jk2 2.0.3-DEV and earlier Apache module allow remote attackers to execute arbitrary code via a long (1) Host header, or (2) Hostname within a Host header.
CVSS Score
7.5
EPSS Score
0.331
Published
2008-02-19


Contact Us

Shodan ® - All rights reserved