|
Lines 34-39
Link Here
|
| 34 |
|
34 |
|
| 35 |
--> |
35 |
--> |
| 36 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
36 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
37 |
<vuln vid="ef2ffb03-f2b0-11db-ad25-0010b5a0a860"> |
| 38 |
<topic> mod_perl -- remote DOS in PATH_INFO parsing</topic> |
| 39 |
<affects> |
| 40 |
<package> |
| 41 |
<name>mod_perl</name> |
| 42 |
<range><lt>1.30</lt></range> |
| 43 |
</package> |
| 44 |
</affects> |
| 45 |
<description> |
| 46 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
| 47 |
<p>CVE repots:</p> |
| 48 |
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349"> |
| 49 |
<p>PerlRun.pm in Apache mod_perl 1.29 and earlier, and RegistryCooker.pm in |
| 50 |
mod_perl 2.x, does not properly escape PATH_INFO before use in a regular |
| 51 |
expression, which allows remote attackers to cause a denial of service |
| 52 |
(resource consumption) via a crafted URI.</p> |
| 53 |
</blockquote> |
| 54 |
</body> |
| 55 |
</description> |
| 56 |
<references> |
| 57 |
<cvename>CVE-2007-1349</cvename> |
| 58 |
<url>URL:http://secunia.com/advisories/24839</url> |
| 59 |
</references> |
| 60 |
<dates> |
| 61 |
<discovery>2007-03-29</discovery> |
| 62 |
<entry>2007-04-24</entry> |
| 63 |
</dates> |
| 64 |
</vuln> |
| 65 |
|
| 37 |
<vuln vid="c389d06d-ee57-11db-bd51-0016179b2dd5"> |
66 |
<vuln vid="c389d06d-ee57-11db-bd51-0016179b2dd5"> |
| 38 |
<topic>claws-mail -- APOP vulnerability</topic> |
67 |
<topic>claws-mail -- APOP vulnerability</topic> |
| 39 |
<affects> |
68 |
<affects> |