Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gjwh-q2rh-9mjm

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.

mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.

Ссылки

EPSS

Процентиль: 97%
0.33663
Средний

Связанные уязвимости

ubuntu
больше 12 лет назад

mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.

redhat
больше 12 лет назад

mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.

nvd
больше 12 лет назад

mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.

debian
больше 12 лет назад

mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Ser ...

EPSS

Процентиль: 97%
0.33663
Средний