httpd:2.4/mod_md vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the httpd:2.4/mod_md package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
CVE-2024-38476

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • H
Improper Input Validation

<1:2.0.8-8.module_el8.6.0+3031+fb177b09
  • H
NULL Pointer Dereference

<1:2.0.8-8.module_el8.6.0+3031+fb177b09
  • H
Improper Encoding or Escaping of Output

<1:2.0.8-8.module_el8.6.0+3031+fb177b09
  • H
Improper Encoding or Escaping of Output

<1:2.0.8-8.module_el8.6.0+3031+fb177b09
  • H
Improper Encoding or Escaping of Output

<1:2.0.8-8.module_el8.6.0+3031+fb177b09
  • M
CVE-2023-38709

<1:2.0.8-8.module_el8.6.0+3031+fb177b09
  • M
Resource Exhaustion

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Out-of-bounds Read

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • H
Allocation of Resources Without Limits or Throttling

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
HTTP Request Smuggling

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Out-of-bounds Write

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
NULL Pointer Dereference

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • H
Out-of-bounds Write

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
HTTP Request Smuggling

<1:2.0.8-8.module_el8.5.0+2609+b30d9eec
  • M
Buffer Overflow

<1:2.0.8-8.module_el8.5.0+2609+b30d9eec
  • M
Session Fixation

<1:2.0.8-8.module_el8.5.0+2609+b30d9eec
  • H
Server-Side Request Forgery (SSRF)

<1:2.0.8-8.module_el8.5.0+2609+b30d9eec
  • H
Out-of-bounds Write

<1:2.0.8-8.module_el8.5.0+2609+b30d9eec
  • M
CVE-2021-30641

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
NULL Pointer Dereference

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • H
HTTP Request Smuggling

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • H
Out-of-bounds Write

<1:2.0.8-8.module_el8.5.0+2609+b30d9eec
  • M
Use of Uninitialized Resource

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Open Redirect

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Open Redirect

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
NULL Pointer Dereference

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Cross-site Scripting (XSS)

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Use After Free

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Out-of-bounds Write

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
HTTP Request Smuggling

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Use After Free

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Resource Exhaustion

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
NULL Pointer Dereference

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Out-of-bounds Read

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
CVE-2021-33193

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Out-of-bounds Write

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Insufficient Verification of Data Authenticity

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
CVE-2022-30556

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Allocation of Resources Without Limits or Throttling

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Allocation of Resources Without Limits or Throttling

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Integer Overflow or Wraparound

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Integer Overflow or Wraparound

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
HTTP Request Smuggling

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Out-of-bounds Write

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Integer Overflow or Wraparound

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
Improper Initialization

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • H
HTTP Request Smuggling

<1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
  • M
HTTP Response Splitting

<1:2.0.8-8.module_el8.6.0+3031+fb177b09
  • M
HTTP Request Smuggling

<1:2.0.8-8.module_el8.6.0+3031+fb177b09
  • M
Out-of-bounds Write

<1:2.0.8-8.module_el8.6.0+3031+fb177b09