Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w76w-v64m-qrv5

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).

Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).

EPSS

Процентиль: 49%
0.00259
Низкий

Дефекты

CWE-200

Связанные уязвимости

redhat
больше 22 лет назад

Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).

nvd
больше 21 года назад

Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).

suse-cvrf
почти 11 лет назад

Recommended update for apache2

EPSS

Процентиль: 49%
0.00259
Низкий

Дефекты

CWE-200