Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p3r2-mvh7-9pcc

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

EPSS

Процентиль: 49%
0.00257
Низкий

Связанные уязвимости

ubuntu
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

redhat
больше 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

nvd
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

debian
около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled ...

oracle-oval
около 11 лет назад

ELSA-2014-1091: mod_wsgi security update (IMPORTANT)

EPSS

Процентиль: 49%
0.00257
Низкий