VYPR

Mod Auth Mellon

by Uninett

CVEs (5)

  • CVE-2016-2146HigApr 15, 2016
    risk 0.49cvss 7.5epss 0.01

    The am_read_post_data function in mod_auth_mellon before 0.11.1 does not limit the amount of data read, which allows remote attackers to cause a denial of service (worker process crash, web server deadlock, or memory consumption) via a large amount of POST data.

  • CVE-2016-2145HigApr 15, 2016
    risk 0.49cvss 7.5epss 0.01

    The am_read_post_data function in mod_auth_mellon before 0.11.1 does not check if the ap_get_client_block function returns an error, which allows remote attackers to cause a denial of service (segmentation fault and process crash) via a crafted POST data.

  • CVE-2017-6807MedMar 13, 2017
    risk 0.40cvss 6.1epss 0.00

    mod_auth_mellon before 0.13.1 is vulnerable to a Cross-Site Session Transfer attack, where a user with access to one web site running on a server can copy their session cookie to a different web site on the same server to get access to that site.

  • CVE-2014-8566Nov 15, 2014
    risk 0.00cvss epss 0.01

    The mod_auth_mellon module before 0.8.1 allows remote attackers to obtain sensitive information or cause a denial of service (segmentation fault) via unspecified vectors related to a "session overflow" involving "sessions overlapping in memory."

  • CVE-2014-8567Nov 14, 2014
    risk 0.00cvss epss 0.04

    The mod_auth_mellon module before 0.8.1 allows remote attackers to cause a denial of service (Apache HTTP server crash) via a crafted logout request that triggers a read of uninitialized data.