Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4566

Опубликовано: 12 дек. 2013
Источник: debian
EPSS Низкий

Описание

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libapache2-mod-nssfixed1.0.8-4package
libapache2-mod-nssno-dsawheezypackage

EPSS

Процентиль: 32%
0.00124
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

redhat
больше 11 лет назад

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

nvd
больше 11 лет назад

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

suse-cvrf
около 11 лет назад

Recommended update for apache2-mod_nss

github
больше 3 лет назад

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

EPSS

Процентиль: 32%
0.00124
Низкий