mod_session vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mod_session package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Memory Leak

<0:2.4.64-1.amzn2023.0.1
  • H
Improper Authentication

<0:2.4.64-1.amzn2023.0.1
  • H
Server-Side Request Forgery (SSRF)

<0:2.4.64-1.amzn2023.0.1
  • H
Improper Access Control

<0:2.4.64-1.amzn2023.0.1
  • H
Reachable Assertion

<0:2.4.64-1.amzn2023.0.1
  • H
Improper Output Neutralization for Logs

<0:2.4.64-1.amzn2023.0.1
  • H
HTTP Response Splitting

<0:2.4.64-1.amzn2023.0.1
  • H
Exposure of Resource to Wrong Sphere

<0:2.4.62-1.amzn2023
  • H
Improper Encoding or Escaping of Output

<0:2.4.61-1.amzn2023
  • H
Improper Encoding or Escaping of Output

<0:2.4.61-1.amzn2023
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:2.4.61-1.amzn2023
  • H
Improper Encoding or Escaping of Output

<0:2.4.61-1.amzn2023
  • H
Information Exposure

<0:2.4.61-1.amzn2023
  • H
Improper Input Validation

<0:2.4.61-1.amzn2023
  • H
NULL Pointer Dereference

<0:2.4.61-1.amzn2023
  • M
HTTP Response Splitting

<0:2.4.59-2.amzn2023
  • M
Improper Input Validation

<0:2.4.59-2.amzn2023
  • H
Resource Exhaustion

<0:2.4.58-1.amzn2023
  • H
Resource Exhaustion

<0:2.4.58-1.amzn2023
  • H
Out-of-bounds Read

<0:2.4.58-1.amzn2023
  • H
HTTP Response Splitting

<0:2.4.56-1.amzn2023
  • H
HTTP Response Splitting

<0:2.4.56-1.amzn2023
  • H
HTTP Response Splitting

<0:2.4.55-1.amzn2023
  • H
HTTP Request Smuggling

<0:2.4.55-1.amzn2023
  • H
Out-of-bounds Read

<0:2.4.55-1.amzn2023
  • H
Insufficient Verification of Data Authenticity

<0:2.4.54-3.amzn2023.0.4
  • H
Information Exposure

<0:2.4.54-3.amzn2023.0.4
  • H
Allocation of Resources Without Limits or Throttling

<0:2.4.54-3.amzn2023.0.4
  • H
Allocation of Resources Without Limits or Throttling

<0:2.4.54-3.amzn2023.0.4
  • H
Integer Overflow or Wraparound

<0:2.4.54-3.amzn2023.0.4
  • H
Integer Overflow or Wraparound

<0:2.4.54-3.amzn2023.0.4
  • H
Out-of-bounds Read

<0:2.4.54-3.amzn2023.0.4
  • H
HTTP Request Smuggling

<0:2.4.54-3.amzn2023.0.4
  • H
Integer Overflow or Wraparound

<0:2.4.54-3.amzn2023.0.4
  • H
Integer Overflow or Wraparound

<0:2.4.54-3.amzn2023.0.4
  • H
HTTP Request Smuggling

<0:2.4.54-3.amzn2023.0.4
  • H
Improper Initialization

<0:2.4.54-3.amzn2023.0.4
  • H
Resource Exhaustion

<0:2.4.54-3.amzn2023.0.4
  • H
NULL Pointer Dereference

<0:2.4.54-3.amzn2023.0.4