Back to VulnFeed / CVE-2013-10075
root@hackertop:~/vulnfeed/CVE-2013-10075#
CVE-2013-10075 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

CHORNY Apache::Session up to 1.94 on Perl DB_File operation after expiration

Apache::Session 13d ago Impact pending confirmation
LIFECYCLE
5.3 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in CHORNY Apache::Session up to 1.94 on Perl and classified as problematic. Affected by this issue is the function Apache::Session::Store::File/Apache::Session::Store::DB_File. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-672. The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.

Impact: Impacted is confidentiality.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2013-10075 · CVSS 5.3 · Active Threat