Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-chfp-36fq-v6g3

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

EPSS

Процентиль: 57%
0.00351
Низкий

Связанные уязвимости

redhat
почти 23 года назад

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

CVSS3: 7.8
nvd
почти 23 года назад

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

CVSS3: 7.8
debian
почти 23 года назад

Off-by-one buffer overflow in the ssl_compat_directive function, as ca ...

EPSS

Процентиль: 57%
0.00351
Низкий