Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-1349

Опубликовано: 22 мар. 2007
Источник: redhat
EPSS Средний

Описание

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=240423mod_perl PerlRun denial of service

EPSS

Процентиль: 93%
0.10289
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

nvd
больше 18 лет назад

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

debian
больше 18 лет назад

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mo ...

github
больше 3 лет назад

PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.

oracle-oval
около 18 лет назад

ELSA-2007-0395: Low: mod_perl security update (LOW)

EPSS

Процентиль: 93%
0.10289
Средний