apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header
Reporter | Title | Published | Views | Family All 42 |
---|---|---|---|---|
![]() | Medium: mod_security | 6 May 201422:19 | – | amazon |
![]() | Medium: mod24_security | 6 May 201422:19 | – | amazon |
![]() | CVE-2013-5705 | 15 Apr 201410:55 | – | debiancve |
![]() | Updated apache-mod_security packages fix security vulnerability | 18 Apr 201400:26 | – | mageia |
![]() | Debian DSA-2991-1 : modsecurity-apache - security update | 28 Jul 201400:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : apache-mod_security (MDVSA-2014:081) | 9 May 201400:00 | – | nessus |
![]() | Amazon Linux AMI : mod_security (ALAS-2014-335) | 12 Oct 201400:00 | – | nessus |
![]() | Fedora 19 : mod_security-2.7.5-3.fc19 (2014-4720) | 15 Apr 201400:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : apache-mod_security (MDVSA-2015:106) | 30 Mar 201500:00 | – | nessus |
![]() | ModSecurity < 2.7.6 Chunked Header Filter Bypass | 12 May 201400:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo