Show filters
333 Total Results
Displaying 151-160 of 333
Sort by:
Attacker Value
Unknown
CVE-2012-6143
Disclosure Date: June 04, 2014 (last updated October 05, 2023)
Spoon::Cookie in the Spoon module 0.24 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.
0
Attacker Value
Unknown
CVE-2013-7284
Disclosure Date: April 29, 2014 (last updated October 05, 2023)
The PlRPC module, possibly 0.2020 and earlier, for Perl uses the Storable module, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.
0
Attacker Value
Unknown
CVE-2014-2285
Disclosure Date: April 27, 2014 (last updated October 05, 2023)
The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
0
Attacker Value
Unknown
CVE-2013-4279
Disclosure Date: April 18, 2014 (last updated October 05, 2023)
imapsync 1.564 and earlier performs a release check by default, which sends sensitive information (imapsync, operating system, and Perl version) to the developer's site.
0
Attacker Value
Unknown
CVE-2010-4777
Disclosure Date: February 10, 2014 (last updated October 05, 2023)
The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
0
Attacker Value
Unknown
CVE-2013-7135
Disclosure Date: January 28, 2014 (last updated October 05, 2023)
The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.
0
Attacker Value
Unknown
CVE-2014-1626
Disclosure Date: January 26, 2014 (last updated October 05, 2023)
XML External Entity (XXE) vulnerability in MARC::File::XML module before 1.0.2 for Perl, as used in Evergreen, Koha, perl4lib, and possibly other products, allows context-dependent attackers to read arbitrary files via a crafted XML file.
0
Attacker Value
Unknown
CVE-2013-2751
Disclosure Date: December 12, 2013 (last updated October 05, 2023)
Eval injection vulnerability in frontview/lib/np_handler.pl in the FrontView web interface in NETGEAR ReadyNAS RAIDiator before 4.1.12 and 4.2.x before 4.2.24 allows remote attackers to execute arbitrary Perl code via a crafted request, related to the "forgot password workflow."
0
Attacker Value
Unknown
CVE-2013-4407
Disclosure Date: November 23, 2013 (last updated April 12, 2024)
HTTP::Body::Multipart in the HTTP-Body module for Perl (1.07 through 1.22, before 1.23) uses the part of the uploaded file's name after the first "." character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed.
0
Attacker Value
Unknown
CVE-2013-2145
Disclosure Date: August 19, 2013 (last updated October 05, 2023)
The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
0