Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fxxc-hq33-c3m6

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

Ссылки

EPSS

Процентиль: 95%
0.17682
Средний

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 18 лет назад

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

redhat
больше 18 лет назад

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

nvd
больше 18 лет назад

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

debian
больше 18 лет назад

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mo ...

oracle-oval
около 18 лет назад

ELSA-2007-0395: Low: mod_perl security update (LOW)

EPSS

Процентиль: 95%
0.17682
Средний

Дефекты

CWE-20