Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-49v2-h77h-w34h

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "" (backslash), which is not handled by the intended AddType directive.

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "" (backslash), which is not handled by the intended AddType directive.

EPSS

Процентиль: 95%
0.17251
Средний

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 17 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

redhat
больше 17 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

nvd
больше 17 лет назад

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

debian
больше 17 лет назад

Apache HTTP Server, when running on Linux with a document root on a Wi ...

EPSS

Процентиль: 95%
0.17251
Средний

Дефекты

CWE-200