Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m67q-f688-xmfm

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Format string vulnerability in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode and using the Apache log, allows remote attackers to execute arbitrary code via format string characters in an HTTP GET request with an "Accept-Encoding: gzip" header.

Format string vulnerability in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode and using the Apache log, allows remote attackers to execute arbitrary code via format string characters in an HTTP GET request with an "Accept-Encoding: gzip" header.

EPSS

Процентиль: 82%
0.01734
Низкий

Связанные уязвимости

nvd
почти 22 года назад

Format string vulnerability in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode and using the Apache log, allows remote attackers to execute arbitrary code via format string characters in an HTTP GET request with an "Accept-Encoding: gzip" header.

debian
почти 22 года назад

Format string vulnerability in mod_gzip_printf for mod_gzip 1.3.26.1a ...

EPSS

Процентиль: 82%
0.01734
Низкий