Vulnerabilities
Vulnerable Software
Mod Security:  Security Vulnerabilities
Interpretation conflict in ModSecurity (mod_security) 2.1.0 and earlier allows remote attackers to bypass request rules via application/x-www-form-urlencoded POST data that contains an ASCIIZ (0x00) byte, which mod_security treats as a terminator even though it is still processed as normal data by some HTTP parsers including PHP 5.2.0, and possibly parsers in Perl, and Python.
CVSS Score
6.8
EPSS Score
0.224
Published
2007-03-08
Off-by-one buffer overflow in ModSecurity (mod_security) 1.7.4 for Apache 2.x, when SecFilterScanPost is enabled, allows remote attackers to execute arbitrary code via crafted POST requests.
CVSS Score
7.5
EPSS Score
0.151
Published
2004-12-31
Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.
CVSS Score
7.5
EPSS Score
0.069
Published
2003-12-31


Contact Us

Shodan ® - All rights reserved