mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:39.434Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0242

No data.

Status : Modified
Published: 2019-12-09T20:15:09.623
Modified: 2024-11-21T02:01:44.333
Link: CVE-2014-0242
