Vulnerabilities (CVE)

Filtered by vendor Mod Ssl Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2005-2700 3 Apache, Mod Ssl, Redhat 4 Http Server, Mod Ssl, Enterprise Linux and 1 more 2024-11-21 10.0 HIGH N/A
ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions.
CVE-2004-0700 2 Gentoo, Mod Ssl 2 Linux, Mod Ssl 2024-11-20 7.5 HIGH N/A
Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
CVE-2004-0488 8 Apache, Gentoo, Mandrakesoft and 5 more 10 Http Server, Linux, Mandrake Linux and 7 more 2024-11-20 7.5 HIGH N/A
Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.
CVE-2002-1157 1 Mod Ssl 1 Mod Ssl 2024-11-20 7.5 HIGH N/A
Cross-site scripting vulnerability in the mod_ssl Apache module 2.8.9 and earlier, when UseCanonicalName is off and wildcard DNS is enabled, allows remote attackers to execute script as other web site visitors, via the server name in an HTTPS response on the SSL port, which is used in a self-referencing URL, a different vulnerability than CAN-2002-0840.
CVE-2002-0653 1 Mod Ssl 1 Mod Ssl 2024-11-20 4.6 MEDIUM 7.8 HIGH
Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.
CVE-2002-0082 2 Apache-ssl, Mod Ssl 2 Apache-ssl, Mod Ssl 2024-11-20 7.5 HIGH N/A
The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.