Описание
Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "" (backslash), which is not handled by the intended AddType directive.
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | DNE | |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
gutsy | DNE | |
hardy | DNE | |
intrepid | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | not-affected | |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
gutsy | not-affected | |
hardy | not-affected | |
intrepid | not-affected | |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.
Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.
Apache HTTP Server, when running on Linux with a document root on a Wi ...
Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.
EPSS
4.3 Medium
CVSS2