Show filters
333 Total Results
Displaying 261-270 of 333
Sort by:
Attacker Value
Unknown
CVE-2006-1565
Disclosure Date: March 31, 2006 (last updated October 04, 2023)
Untrusted search path vulnerability in libgpib-perl 3.2.06-2 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the LinuxGpib.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
0
Attacker Value
Unknown
CVE-2006-1566
Disclosure Date: March 31, 2006 (last updated October 04, 2023)
Untrusted search path vulnerability in libtunepimp-perl 0.4.2-1 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the tunepimp.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
0
Attacker Value
Unknown
CVE-2006-0898
Disclosure Date: February 25, 2006 (last updated October 04, 2023)
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
0
Attacker Value
Unknown
CVE-2005-4872
Disclosure Date: December 31, 2005 (last updated February 13, 2023)
Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number of named subpatterns, which triggers a buffer overflow. NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
0
Attacker Value
Unknown
CVE-2005-4780
Disclosure Date: December 31, 2005 (last updated June 05, 2020)
** DISPUTED ** Cross-site scripting (XSS) vulnerability in Fidra Lighthouse CMS 1.1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameter in a query_string to the home page. NOTE: The vendor disputes this issue, saying "Lighthouse does not in any way make use of the PHP technology. [It] is an application server ... A technology like this cannot be susceptible to client-side cross-site-scripting-attacks on its own, but only applications created based on such a technology. This does not only apply to Lighthouse, but also to Perl, PHP or web applications based on Java Servlet technology." Since the original researcher is known to test demo pages and is sometimes inaccurate, it is likely that this issue will be REJECTED.
0
Attacker Value
Unknown
CVE-2005-4536
Disclosure Date: December 31, 2005 (last updated October 04, 2023)
Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
0
Attacker Value
Unknown
CVE-2005-4278
Disclosure Date: December 16, 2005 (last updated October 04, 2023)
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
0
Attacker Value
Unknown
CVE-2005-4261
Disclosure Date: December 15, 2005 (last updated October 04, 2023)
Unspecified vulnerability in Positive Software Corporation CP+ (cpplus) before 2.5.5 allows attackers to have unknown impact and attack vectors, related to "a possible security flaw caused by a bug in Perl." NOTE: unless CP+ includes its own copy of Perl with CVE-2005-3962, this is a different vulnerability than CVE-2005-3962; however, there is insufficient information to be sure.
0
Attacker Value
Unknown
CVE-2005-4217
Disclosure Date: December 14, 2005 (last updated October 04, 2023)
Perl in Apple Mac OS X Server 10.3.9 does not properly drop privileges when using the "$<" variable to set uid, which allows attackers to gain privileges.
0
Attacker Value
Unknown
CVE-2005-4158
Disclosure Date: December 11, 2005 (last updated October 04, 2023)
Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.
0