Описание
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
Ссылки
- Release NotesThird Party Advisory
- Release NotesVendor Advisory
- Mailing List
- Third Party AdvisoryVDB Entry
- Release NotesThird Party Advisory
- Release NotesVendor Advisory
- Mailing List
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
EPSS
7.5 High
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
mod_wsgi module before 3.4 for Apache, when used in embedded mode, mig ...
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
EPSS
7.5 High
CVSS3
4.3 Medium
CVSS2