Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mod ssl vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-2700
ssl_engine_kernel.c in mod_ssl prior to 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote malicious users to bypass intende...
Apache Http Server
Debian Debian Linux 3.1
Debian Debian Linux 3.0
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
NA
CVE-2005-2728
The byte-range filter in Apache 2.0 prior to 2.0.54 allows remote malicious users to cause a denial of service (memory consumption) via an HTTP header with a large Range field.
Apache Http Server 2.0.42
Apache Http Server 2.0.47
Apache Http Server 2.0.50
Apache Http Server 2.0.35
Apache Http Server 2.0.37
Apache Http Server 2.0.44
Apache Http Server 2.0.39
Apache Http Server 2.0.52
Apache Http Server 2.0.53
Apache Http Server 2.0.51
Apache Http Server 2.0.28
Apache Http Server 2.0.41
Apache Http Server 2.0.49
Apache Http Server 2.0.9
Apache Http Server 2.0.32
Apache Http Server 2.0.38
Apache Http Server 2.0.48
Apache Http Server 2.0.45
Apache Http Server 2.0.40
Apache Http Server 2.0.36
Apache Http Server 2.0.46
Apache Http Server 2.0.43
NA
CVE-2004-0700
Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl prior to 2.8.19 for Apache prior to 1.3.31 may allow remote malicious users to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are ha...
Mod Ssl Mod Ssl 2.4.10
Mod Ssl Mod Ssl 2.4.2
Mod Ssl Mod Ssl 2.4.9
Mod Ssl Mod Ssl 2.5.0
Mod Ssl Mod Ssl 2.6.6
Mod Ssl Mod Ssl 2.7.0
Mod Ssl Mod Ssl 2.8.14
Mod Ssl Mod Ssl 2.8.15
Mod Ssl Mod Ssl 2.8.5
Mod Ssl Mod Ssl 2.8.5.1
Mod Ssl Mod Ssl 2.4.0
Mod Ssl Mod Ssl 2.4.1
Mod Ssl Mod Ssl 2.4.7
Mod Ssl Mod Ssl 2.4.8
Mod Ssl Mod Ssl 2.6.4
Mod Ssl Mod Ssl 2.6.5
Mod Ssl Mod Ssl 2.8.10
Mod Ssl Mod Ssl 2.8.12
Mod Ssl Mod Ssl 2.8.3
Mod Ssl Mod Ssl 2.8.4
Mod Ssl Mod Ssl 2.4.3
Mod Ssl Mod Ssl 2.4.4
NA
CVE-2004-0488
Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote malicious users to execute arbitrary code via a client certificate with a long subject DN.
Apache Http Server
Debian Debian Linux 3.0
Redhat Enterprise Linux Server 2.0
Redhat Enterprise Linux Workstation 2.0
NA
CVE-2002-1157
Cross-site scripting vulnerability in the mod_ssl Apache module 2.8.9 and previous versions, when UseCanonicalName is off and wildcard DNS is enabled, allows remote malicious users to execute script as other web site visitors, via the server name in an HTTPS response on the SSL p...
Mod Ssl Mod Ssl
NA
CVE-2002-0082
The dbm and shm session cache code in mod_ssl prior to 2.8.7-1.3.23, and Apache-SSL prior to 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote malicious users to use a buffer overflow to execute arbitrary code via a large cli...
Apache-ssl Apache-ssl 1.45
Apache-ssl Apache-ssl 1.46
Mod Ssl Mod Ssl 2.8.5
Mod Ssl Mod Ssl 2.8.6
Apache-ssl Apache-ssl 1.42
Apache-ssl Apache-ssl 1.44
Mod Ssl Mod Ssl 2.8.3
Mod Ssl Mod Ssl 2.8.4
Mod Ssl Mod Ssl 2.7.1
Mod Ssl Mod Ssl 2.8
Apache-ssl Apache-ssl 1.40
Apache-ssl Apache-ssl 1.41
Mod Ssl Mod Ssl 2.8.1
Mod Ssl Mod Ssl 2.8.2
3 EDB exploits
3 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2