{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T09:47:11.758","vulnerabilities":[{"cve":{"id":"CVE-2008-2384","sourceIdentifier":"cve@mitre.org","published":"2009-01-22T18:30:00.313","lastModified":"2026-04-23T00:35:47.467","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \\ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en mod_auth_mysql.c en el módulo mod-auth-mysql (alias libapache2-mod-auth-mysql) para Apache HTTP Server 2.x, permite a atacantes remotos ejecutar comandos SQL de su elección a través de codificaciones de caracteres multibyte para entradas no especificadas."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:joey_schulze:mod_auth_mysql:*:*:*:*:*:*:*:*","matchCriteriaId":"AA0279B9-09FB-47F7-BBDB-71695C08351E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*","matchCriteriaId":"D623D8C0-65D2-4269-A1D4-5CB3899F44C8"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"163A6EF6-7D3F-4B1F-9E03-A8C86562CC3D"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*","matchCriteriaId":"154566FB-0D1A-4DC2-AFE6-49DE93850951"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*","matchCriteriaId":"EB477AFB-EA39-4892-B772-586CF6D2D235"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*","matchCriteriaId":"5C4962BB-0E61-4788-B582-21F05CD33AD3"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.28:beta:win32:*:*:*:*:*","matchCriteriaId":"BBD08D4C-3C73-4AAE-8343-BBE487CF6040"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*","matchCriteriaId":"B35906CD-038E-4243-8A95-F0A3A43F06F7"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*","matchCriteriaId":"1C3E2656-8071-40DA-9480-AC13010A9D09"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.32:beta:win32:*:*:*:*:*","matchCriteriaId":"F88372A5-FDF3-4B75-BB4C-8D9C9E8AD850"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*","matchCriteriaId":"7C649D2F-A633-456E-899C-6253FDE9A626"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.34:beta:win32:*:*:*:*:*","matchCriteriaId":"432DA9CE-EB82-406B-AD23-FD565E6C91BB"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*","matchCriteriaId":"B940BB85-03F5-46D7-8DC9-2E1E228D3D98"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*","matchCriteriaId":"82139FFA-2779-4732-AFA5-4E6E19775899"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*","matchCriteriaId":"B7F717E6-BACD-4C8A-A9C5-516ADA6FEE6C"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*","matchCriteriaId":"08AB120B-2FEC-4EB3-9777-135D81E809AA"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*","matchCriteriaId":"1C7FF669-12E0-4A73-BBA7-250D109148C5"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*","matchCriteriaId":"5AB7B1F1-7202-445D-9F96-135DC0AFB1E9"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*","matchCriteriaId":"BCB7EE53-187E-40A9-9865-0F3EDA2B5A4C"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*","matchCriteriaId":"9D06AE8A-9BA8-4AA8-ACEA-326CD001E879"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*","matchCriteriaId":"2FC1A04B-0466-48AD-89F3-1F2EF1DEBE6A"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*","matchCriteriaId":"19F34D08-430E-4331-A27D-667149425176"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*","matchCriteriaId":"248BDF2C-3E78-49D1-BD9C-60C09A441724"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*","matchCriteriaId":"BB0FDE3D-1509-4375-8703-0D174D70B22E"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.46:*:win32:*:*:*:*:*","matchCriteriaId":"3C32C8EB-A762-46FB-81C0-06E51109610F"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*","matchCriteriaId":"AFE732B5-00C9-4443-97E0-1DF21475C26B"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*","matchCriteriaId":"C79C41D3-6894-4F2D-B8F8-82AB4780A824"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*","matchCriteriaId":"449A5647-CEA6-4314-9DB8-D086F388E1C7"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*","matchCriteriaId":"B5A407B7-F432-48F0-916A-A49952F85CA6"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*","matchCriteriaId":"6B5AC769-D07D-43C7-B252-A5A812E7D58C"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*","matchCriteriaId":"ADF4DBF6-DAF0-47E7-863B-C48DB7149A78"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*","matchCriteriaId":"F2F19D71-0A58-4B03-B351-596EB67ECF80"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*","matchCriteriaId":"5EBB3FF9-CF5A-4E7B-ACE3-A198343AD485"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*","matchCriteriaId":"D721FFB5-D6D3-4F60-8B09-B3AD07EE6D4D"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*","matchCriteriaId":"97E8F32E-C2E5-44E3-A920-F09AF919D372"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*","matchCriteriaId":"0CF37A82-49B6-45D4-B91D-FDA2D4463A0C"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*","matchCriteriaId":"030D1767-2DF7-48E3-B462-4B49CA751B35"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.58:*:win32:*:*:*:*:*","matchCriteriaId":"F4E01B68-95EC-4CC7-8929-B3F4EF382ADB"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*","matchCriteriaId":"5236DC61-5557-4C24-8F5B-F48548448588"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*","matchCriteriaId":"8CB9F19A-5DC0-4C44-8BAF-B8FD047DAB56"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*","matchCriteriaId":"3B468F9B-2514-425C-9279-0FCAF73BBD18"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*","matchCriteriaId":"00BC31A3-B9AC-4776-83C1-668636B74104"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D72E88F0-AB0F-4B6F-AE86-71B0DE84BD75"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"840FF871-79EC-472C-91BD-9E9AFC36B408"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*","matchCriteriaId":"191E8654-5338-4051-A1D5-EE491D594F13"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*","matchCriteriaId":"B26CC819-7315-456F-9F95-2A64FCE6AC26"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3774827-AB0B-4A95-844B-9BC904A9FE98"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"18D07925-542B-4369-AA21-5587703E12E0"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*","matchCriteriaId":"ACC83EB5-4E9A-4EA9-8D9F-BDBF5F60C54A"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*","matchCriteriaId":"80632488-5C7E-4C70-BB60-BC4756187670"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*","matchCriteriaId":"ACBC75F8-C1AF-45AE-91BA-5670EF2D0DCD"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"67AD11FB-529C-404E-A13B-284F145322B8"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"733D62FE-180A-4AE8-9DBF-DA1DC18C1932"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"CCBBB7FE-35FC-4515-8393-5145339FCE4D"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2.2:*:windows:*:*:*:*:*","matchCriteriaId":"9708E73F-33D8-45DD-BC88-19A590F05103"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"F519633F-AB68-495A-B85E-FD41F9F752CA"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2.3:*:windows:*:*:*:*:*","matchCriteriaId":"D0F5026B-E97E-48EB-871D-A77E44AE2C38"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"A894BED6-C97D-4DA4-A13D-9CB2B3306BC5"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*","matchCriteriaId":"34A847D1-5AD5-4EFD-B165-7602AFC1E656"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:2.3.0:*:*:*:*:*:*:*","matchCriteriaId":"C338A4DA-B714-414D-94B3-15EAE8147D4B"}]}]}],"references":[{"url":"http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053899.html","source":"cve@mitre.org"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053903.html","source":"cve@mitre.org"},{"url":"http://openwall.com/lists/oss-security/2009/01/21/10","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/33627","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/43302","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2009-0259.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2010-1002.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/33392","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2009/0226","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2011/0367","source":"cve@mitre.org"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=480238","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48163","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10172","source":"cve@mitre.org"},{"url":"http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053899.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053903.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://openwall.com/lists/oss-security/2009/01/21/10","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/33627","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/43302","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2009-0259.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2010-1002.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/33392","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2009/0226","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2011/0367","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=480238","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48163","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10172","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"Please note that this describes the software used in debian as mod-auth-mysql (binary name is libapache2-mod-auth-mysql). It is different from the Sourceforge project.\r\n"}}]}