Vulnerability Details CVE-2014-0242
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.081
EPSS Ranking 91.8%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 4.3
Products affected by CVE-2014-0242
-
cpe:2.3:a:modwsgi:mod_wsgi:1.0
-
cpe:2.3:a:modwsgi:mod_wsgi:1.1
-
cpe:2.3:a:modwsgi:mod_wsgi:1.2
-
cpe:2.3:a:modwsgi:mod_wsgi:1.3
-
cpe:2.3:a:modwsgi:mod_wsgi:1.4
-
cpe:2.3:a:modwsgi:mod_wsgi:1.5
-
cpe:2.3:a:modwsgi:mod_wsgi:1.6
-
cpe:2.3:a:modwsgi:mod_wsgi:2.0
-
cpe:2.3:a:modwsgi:mod_wsgi:2.1
-
cpe:2.3:a:modwsgi:mod_wsgi:2.2
-
cpe:2.3:a:modwsgi:mod_wsgi:2.3
-
cpe:2.3:a:modwsgi:mod_wsgi:2.4
-
cpe:2.3:a:modwsgi:mod_wsgi:2.5
-
cpe:2.3:a:modwsgi:mod_wsgi:2.6
-
cpe:2.3:a:modwsgi:mod_wsgi:2.7
-
cpe:2.3:a:modwsgi:mod_wsgi:2.8
-
cpe:2.3:a:modwsgi:mod_wsgi:3.0
-
cpe:2.3:a:modwsgi:mod_wsgi:3.1
-
cpe:2.3:a:modwsgi:mod_wsgi:3.2
-
cpe:2.3:a:modwsgi:mod_wsgi:3.3