httpd24-mod_md vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the httpd24-mod_md package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
HTTP Response Splitting

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
HTTP Response Splitting

*
  • M
HTTP Request Smuggling

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Buffer Overflow

<0:2.4.34-7.el7
  • M
Use After Free

<0:2.4.34-7.el7
  • M
Resource Exhaustion

<0:2.4.34-7.el7
  • M
Improper Input Validation

<0:2.4.34-7.el7
  • M
Integer Overflow or Wraparound

<0:2.4.34-7.el7
  • M
Improper Input Validation

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
NULL Pointer Dereference

<0:2.4.34-7.el7
  • M
Heap-based Buffer Overflow

<0:2.4.34-7.el7
  • M
Insufficient Session Expiration

<0:2.4.34-15.el7
  • M
Out-of-Bounds

*
  • L
Improper Handling of Syntactically Invalid Structure

*
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Open Redirect

<1:2.0.8-1.el7
  • M
Resource Exhaustion

*
  • L
HTTP Request Smuggling

*
  • M
Use After Free

*
  • L
Use After Free

*
  • M
Buffer Overflow

<0:2.4.34-15.el7
  • M
Resource Exhaustion

<0:2.4.34-15.el7
  • L
Missing Initialization of a Variable

*
  • M
Open Redirect

<1:2.0.8-1.el7
  • M
Improper Access Control

<0:2.4.34-15.el7
  • M
Path Equivalence

<0:2.4.34-15.el7
  • H
Resource Exhaustion

<0:2.4.34-8.el7.1
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • H
Resource Exhaustion

<0:2.4.34-8.el7.1
  • H
Resource Exhaustion

<0:2.4.34-8.el7.1
  • M
Incorrect Calculation of Buffer Size

<0:2.4.34-7.el7
  • M
Authentication Bypass by Primary Weakness

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Cross-site Scripting (XSS)

<0:2.4.34-15.el7
  • M
Out-of-bounds Write

<0:2.4.34-7.el7
  • M
Information Exposure

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • H
Authentication Bypass by Primary Weakness

<0:2.4.34-7.el7.1
  • M
Out-of-bounds Write

<0:2.4.34-7.el7
  • M
Out-of-bounds Write

<0:2.4.34-7.el7
  • H
Execution with Unnecessary Privileges

<0:2.4.34-7.el7.1
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Improper Authentication

<0:2.4.34-7.el7
  • M
Improper Input Validation

*
  • M
Heap-based Buffer Overflow

<0:2.4.34-7.el7
  • M
Out-of-bounds Read

<0:2.4.34-7.el7
  • M
Improper Certificate Validation

<0:2.4.34-7.el7
  • M
Improper Input Validation

<0:2.4.34-7.el7
  • M
Use After Free

<0:2.4.34-7.el7
  • M
Improper Input Validation

<0:2.4.34-7.el7
  • M
Integer Overflow or Wraparound

<0:2.4.34-7.el7
  • M
Use After Free

<0:2.4.34-7.el7
  • M
Out-of-bounds Write

<0:2.4.34-7.el7
  • M
Integer Overflow or Wraparound

<0:2.4.34-7.el7
  • M
Use After Free

<0:2.4.34-7.el7
  • M
Resource Injection

<0:2.4.34-7.el7
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
Improper Certificate Validation

<0:2.4.34-7.el7
  • M
Improper Certificate Validation

<0:2.4.34-7.el7
  • L
Out-of-Bounds

*
  • M
Improper Authentication

*
  • L
Access Restriction Bypass

*