Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-chfp-36fq-v6g3

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

EPSS

Процентиль: 63%
0.00456
Низкий

Связанные уязвимости

redhat
около 23 лет назад

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

CVSS3: 7.8
nvd
около 23 лет назад

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

CVSS3: 7.8
debian
около 23 лет назад

Off-by-one buffer overflow in the ssl_compat_directive function, as ca ...

EPSS

Процентиль: 63%
0.00456
Низкий