A vulnerability is identified in the handling of certain types of requests by Xitami. Because of this, it is possible for a remote attacker to deny service to legitimate users of a vulnerable server. Xitami 2.5c1 is reported prone to this issue, however, other versions may be affected as well.
A vulnerability is identified in the handling of certain types of requests by Xitami. Because of this, it is possible for a remote attacker to deny service to legitimate users of a vulnerable server. Xitami 2.5c1 is reported prone to this issue, however, other versions may be affected as well.