Логотип exploitDog
bind:"CVE-2014-0242" OR bind:"CVE-2014-0240"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2014-0242" OR bind:"CVE-2014-0240"

Количество 12

Количество 12

oracle-oval логотип

ELSA-2014-0788

около 11 лет назад

ELSA-2014-0788: mod_wsgi security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2014-0242

больше 5 лет назад

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2014-0242

больше 11 лет назад

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2014-0242

больше 5 лет назад

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2014-0242

больше 5 лет назад

mod_wsgi module before 3.4 for Apache, when used in embedded mode, mig ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2014-0240

около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

CVSS2: 6.2
EPSS: Низкий
redhat логотип

CVE-2014-0240

больше 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

CVSS2: 6.9
EPSS: Низкий
nvd логотип

CVE-2014-0240

около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

CVSS2: 6.2
EPSS: Низкий
debian логотип

CVE-2014-0240

около 11 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled ...

CVSS2: 6.2
EPSS: Низкий
github логотип

GHSA-jf6g-4gpq-f62c

больше 3 лет назад

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-p3r2-mvh7-9pcc

больше 3 лет назад

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

EPSS: Низкий
oracle-oval логотип

ELSA-2014-1091

около 11 лет назад

ELSA-2014-1091: mod_wsgi security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2014-0788

ELSA-2014-0788: mod_wsgi security update (IMPORTANT)

около 11 лет назад
ubuntu логотип
CVE-2014-0242

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVSS3: 7.5
8%
Низкий
больше 5 лет назад
redhat логотип
CVE-2014-0242

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVSS2: 5
8%
Низкий
больше 11 лет назад
nvd логотип
CVE-2014-0242

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVSS3: 7.5
8%
Низкий
больше 5 лет назад
debian логотип
CVE-2014-0242

mod_wsgi module before 3.4 for Apache, when used in embedded mode, mig ...

CVSS3: 7.5
8%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2014-0240

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

CVSS2: 6.2
0%
Низкий
около 11 лет назад
redhat логотип
CVE-2014-0240

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

CVSS2: 6.9
0%
Низкий
больше 11 лет назад
nvd логотип
CVE-2014-0240

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

CVSS2: 6.2
0%
Низкий
около 11 лет назад
debian логотип
CVE-2014-0240

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled ...

CVSS2: 6.2
0%
Низкий
около 11 лет назад
github логотип
GHSA-jf6g-4gpq-f62c

mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.

CVSS3: 7.5
8%
Низкий
больше 3 лет назад
github логотип
GHSA-p3r2-mvh7-9pcc

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2014-1091

ELSA-2014-1091: mod_wsgi security update (IMPORTANT)

около 11 лет назад

Уязвимостей на страницу