Show filters
333 Total Results
Displaying 181-190 of 333
Sort by:
Attacker Value
Unknown
CVE-2011-3599
Disclosure Date: October 10, 2011 (last updated October 04, 2023)
The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.
0
Attacker Value
Unknown
CVE-2011-2766
Disclosure Date: September 23, 2011 (last updated October 04, 2023)
The FCGI (aka Fast CGI) module 0.70 through 0.73 for Perl, as used by CGI::Fast, uses environment variable values from one request during processing of a later request, which allows remote attackers to bypass authentication via crafted HTTP headers.
0
Attacker Value
Unknown
CVE-2011-2201
Disclosure Date: September 14, 2011 (last updated October 04, 2023)
The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input.
0
Attacker Value
Unknown
CVE-2009-5081
Disclosure Date: June 30, 2011 (last updated October 04, 2023)
The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
0
Attacker Value
Unknown
CVE-2011-0633
Disclosure Date: May 13, 2011 (last updated October 04, 2023)
The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated. NOTE: it could be argued that this is a design limitation of the Net::HTTPS API, and separate implementations should be independently assigned CVE identifiers for not working around this limitation. However, because this API was modified within LWP, a single CVE identifier has been assigned.
0
Attacker Value
Unknown
CVE-2011-0761
Disclosure Date: May 13, 2011 (last updated October 04, 2023)
Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.
0
Attacker Value
Unknown
CVE-2011-1487
Disclosure Date: April 11, 2011 (last updated October 04, 2023)
The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
0
Attacker Value
Unknown
CVE-2011-0923
Disclosure Date: February 09, 2011 (last updated October 04, 2023)
The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
0
Attacker Value
Unknown
CVE-2010-4334
Disclosure Date: January 14, 2011 (last updated October 04, 2023)
The IO::Socket::SSL module 1.35 for Perl, when verify_mode is not VERIFY_NONE, fails open to VERIFY_NONE instead of throwing an error when a ca_file/ca_path cannot be verified, which allows remote attackers to bypass intended certificate restrictions.
0
Attacker Value
Unknown
CVE-2010-2389
Disclosure Date: October 14, 2010 (last updated October 04, 2023)
Unspecified vulnerability in the Perl component in Oracle Database Server 11.2.0.1, 11.1.0.7, 10.2.0.3, 10.2.0.4, and 10.1.0.5; and Fusion Middleware 11.1.1.1.0 and 11.1.1.2.0; allows local users to affect integrity via unknown vectors related to Local Logon.
0