- EPSS 5.54%
- Published 26.08.2018 16:29:00
- Last modified 21.11.2024 01:28:55
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control ...
CVE-2009-0796
- EPSS 24.08%
- Published 07.04.2009 23:30:00
- Last modified 09.04.2025 00:30:58
Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the...
- EPSS 17.13%
- Published 30.03.2007 00:19:00
- Last modified 09.04.2025 00:30:58
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted U...