The mod_wsgi module for Apache (daemon mode) before 3.5 does not handle error codes from setuid, allowing local users to gain privileges
Reporter | Title | Published | Views | Family All 59 |
---|---|---|---|---|
![]() | CentOS Update for mod_wsgi CESA-2014:1091 centos7 | 10 Sep 201400:00 | – | openvas |
![]() | Oracle: Security Advisory (ELSA-2014-1091) | 6 Oct 201500:00 | – | openvas |
![]() | RedHat Update for mod_wsgi RHSA-2014:1091-01 | 26 Aug 201400:00 | – | openvas |
![]() | Amazon Linux: Security Advisory (ALAS-2014-376) | 8 Sep 201500:00 | – | openvas |
![]() | Debian Security Advisory DSA 2937-1 (mod-wsgi - security update) | 27 May 201400:00 | – | openvas |
![]() | Fedora Update for mod_wsgi FEDORA-2014-6938 | 23 Jun 201400:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-2222-1) | 2 Jun 201400:00 | – | openvas |
![]() | Amazon Linux: Security Advisory (ALAS-2014-375) | 8 Sep 201500:00 | – | openvas |
![]() | CentOS Update for mod_wsgi CESA-2014:0788 centos6 | 1 Jul 201400:00 | – | openvas |
![]() | Fedora Update for mod_wsgi FEDORA-2014-6944 | 23 Jun 201400:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo