Количество 12
Количество 12
ELSA-2014-0788
ELSA-2014-0788: mod_wsgi security update (IMPORTANT)

CVE-2014-0242
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVE-2014-0242
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVE-2014-0242
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
CVE-2014-0242
mod_wsgi module before 3.4 for Apache, when used in embedded mode, mig ...

CVE-2014-0240
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

CVE-2014-0240
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

CVE-2014-0240
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
CVE-2014-0240
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled ...
GHSA-jf6g-4gpq-f62c
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
GHSA-p3r2-mvh7-9pcc
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
ELSA-2014-1091
ELSA-2014-1091: mod_wsgi security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2014-0788 ELSA-2014-0788: mod_wsgi security update (IMPORTANT) | около 11 лет назад | |||
![]() | CVE-2014-0242 mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. | CVSS3: 7.5 | 8% Низкий | больше 5 лет назад |
![]() | CVE-2014-0242 mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. | CVSS2: 5 | 8% Низкий | больше 11 лет назад |
![]() | CVE-2014-0242 mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. | CVSS3: 7.5 | 8% Низкий | больше 5 лет назад |
CVE-2014-0242 mod_wsgi module before 3.4 for Apache, when used in embedded mode, mig ... | CVSS3: 7.5 | 8% Низкий | больше 5 лет назад | |
![]() | CVE-2014-0240 The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. | CVSS2: 6.2 | 0% Низкий | около 11 лет назад |
![]() | CVE-2014-0240 The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. | CVSS2: 6.9 | 0% Низкий | больше 11 лет назад |
![]() | CVE-2014-0240 The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. | CVSS2: 6.2 | 0% Низкий | около 11 лет назад |
CVE-2014-0240 The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled ... | CVSS2: 6.2 | 0% Низкий | около 11 лет назад | |
GHSA-jf6g-4gpq-f62c mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. | CVSS3: 7.5 | 8% Низкий | больше 3 лет назад | |
GHSA-p3r2-mvh7-9pcc The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. | 0% Низкий | больше 3 лет назад | ||
ELSA-2014-1091 ELSA-2014-1091: mod_wsgi security update (IMPORTANT) | около 11 лет назад |
Уязвимостей на страницу