Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.
lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
secunia.com/advisories/34597
sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1
support.apple.com/kb/HT4435
svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&r2=761081&pathrev=761081&diff_format=h
svn.apache.org/viewvc?view=rev&revision=761081
www.gossamer-threads.com/lists/modperl/modperl-cvs/99477#99477
www.gossamer-threads.com/lists/modperl/modperl/99475#99475
www.mandriva.com/security/advisories?name=MDVSA-2009:091
www.securityfocus.com/archive/1/502709/100/0/threaded
www.securityfocus.com/bid/34383
www.securitytracker.com/id?1021988
www.vupen.com/english/advisories/2009/0943
bugzilla.redhat.com/show_bug.cgi?id=494402
launchpad.net/bugs/cve/2009-0796
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488