Описание
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 3.5-1 |
esm-infra-legacy/trusty | not-affected | 3.4-4ubuntu2 |
lucid | ignored | end of life |
precise | released | 3.3-4ubuntu0.1 |
saucy | not-affected | 3.4-4 |
trusty | not-affected | 3.4-4ubuntu2 |
trusty/esm | not-affected | 3.4-4ubuntu2 |
upstream | released | 3.4 |
Показывать по
4.3 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
mod_wsgi module before 3.4 for Apache, when used in embedded mode, mig ...
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
4.3 Medium
CVSS2
7.5 High
CVSS3