Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-6514

Опубликовано: 21 дек. 2007
Источник: debian
EPSS Средний

Описание

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.17-1package
linux-2.6.24not-affectedpackage

Примечания

  • While labeled as an Apache flaw, fix required in smbfs

EPSS

Процентиль: 95%
0.17251
Средний

Связанные уязвимости

ubuntu
больше 17 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

redhat
больше 17 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

nvd
больше 17 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

github
больше 3 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

EPSS

Процентиль: 95%
0.17251
Средний