Show filters
333 Total Results
Displaying 31-40 of 333
Sort by:
Attacker Value
Unknown

CVE-2023-47039

Disclosure Date: January 02, 2024 (last updated November 06, 2024)
A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.
Attacker Value
Unknown

CVE-2023-47038

Disclosure Date: December 18, 2023 (last updated May 30, 2024)
A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
Attacker Value
Unknown

CVE-2023-47100

Disclosure Date: December 02, 2023 (last updated December 09, 2023)
In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.
Attacker Value
Unknown

CVE-2022-48522

Disclosure Date: August 22, 2023 (last updated October 08, 2023)
In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.
Attacker Value
Unknown

CVE-2023-31486

Disclosure Date: April 29, 2023 (last updated October 08, 2023)
HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
Attacker Value
Unknown

CVE-2023-26490

Disclosure Date: March 04, 2023 (last updated October 08, 2023)
mailcow is a dockerized email package, with multiple containers linked in one bridged network. The Sync Job feature - which can be made available to standard users by assigning them the necessary permission - suffers from a shell command injection. A malicious user can abuse this vulnerability to obtain shell access to the Docker container running dovecot. The imapsync Perl script implements all the necessary functionality for this feature, including the XOAUTH2 authentication mechanism. This code path creates a shell command to call openssl. However, since different parts of the specified user password are included without any validation, one can simply execute additional shell commands. Notably, the default ACL for a newly-created mailcow account does not include the necessary permission. The Issue has been fixed within the 2023-03 Update (March 3rd 2023). As a temporary workaround the Syncjob ACL can be removed from all mailbox users, preventing from creating or changing existing S…
Attacker Value
Unknown

CVE-2020-36659

Disclosure Date: January 27, 2023 (last updated October 08, 2023)
In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
Attacker Value
Unknown

CVE-2020-36658

Disclosure Date: January 27, 2023 (last updated October 08, 2023)
In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
Attacker Value
Unknown

CVE-2023-24038

Disclosure Date: January 21, 2023 (last updated October 08, 2023)
The HTML-StripScripts module through 1.06 for Perl allows _hss_attval_style ReDoS because of catastrophic backtracking for HTML content with certain style attributes.
Attacker Value
Unknown

CVE-2022-4170

Disclosure Date: December 09, 2022 (last updated October 08, 2023)
The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.