Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xww8-g9jm-p823

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode, allows remote attackers to execute arbitrary code via a long filename in a GET request with an "Accept-Encoding: gzip" header.

Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode, allows remote attackers to execute arbitrary code via a long filename in a GET request with an "Accept-Encoding: gzip" header.

EPSS

Процентиль: 89%
0.04778
Низкий

Связанные уязвимости

nvd
почти 22 года назад

Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode, allows remote attackers to execute arbitrary code via a long filename in a GET request with an "Accept-Encoding: gzip" header.

debian
почти 22 года назад

Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a ...

EPSS

Процентиль: 89%
0.04778
Низкий