Show filters
333 Total Results
Displaying 231-240 of 333
Sort by:
Attacker Value
Unknown
CVE-2007-1659
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
0
Attacker Value
Unknown
CVE-2007-4767
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.
0
Attacker Value
Unknown
CVE-2007-1661
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the "\X?\d" and "\P{L}?\d" patterns.
0
Attacker Value
Unknown
CVE-2007-1660
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
0
Attacker Value
Unknown
CVE-2007-5116
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
0
Attacker Value
Unknown
CVE-2007-1662
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
0
Attacker Value
Unknown
CVE-2007-4768
Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
0
Attacker Value
Unknown
CVE-2007-4829
Disclosure Date: November 02, 2007 (last updated October 04, 2023)
Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has ".." sequences.
0
Attacker Value
Unknown
CVE-2007-4596
Disclosure Date: August 30, 2007 (last updated October 04, 2023)
The perl extension in PHP does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code via the Perl eval function. NOTE: this might only be a vulnerability in limited environments.
0
Attacker Value
Unknown
CVE-2007-4144
Disclosure Date: August 03, 2007 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in sample-forms/simple-contact-form-with-preview/simple-contact-form-with-preview.html in MitriDAT eMail Form Processor Pro allows remote attackers to inject arbitrary web script or HTML via the base_path parameter, possibly related to (1) formprocessorpro.php in the PHP version of the product, and (2) formprocessorpro.pl in the Perl version of the product.
0