Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-6514

Опубликовано: 21 дек. 2007
Источник: debian
EPSS Низкий

Описание

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.17-1package
linux-2.6.24not-affectedpackage

Примечания

  • While labeled as an Apache flaw, fix required in smbfs

EPSS

Процентиль: 93%
0.09678
Низкий

Связанные уязвимости

ubuntu
почти 18 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

redhat
почти 18 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

nvd
почти 18 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

github
больше 3 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

EPSS

Процентиль: 93%
0.09678
Низкий