Show filters
333 Total Results
Displaying 41-50 of 333
Sort by:
Attacker Value
Unknown

CVE-2022-43660

Disclosure Date: December 07, 2022 (last updated October 08, 2023)
Improper neutralization of Server-Side Includes (SSW) within a web page in Movable Type series allows a remote authenticated attacker with Privilege of 'Manage of Content Types' may execute an arbitrary Perl script and/or an arbitrary OS command. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
Attacker Value
Unknown

CVE-2022-44542

Disclosure Date: November 01, 2022 (last updated October 08, 2023)
lesspipe before 2.06 allows attackers to execute code via Perl Storable (pst) files, because of deserialized object destructor execution via a key/value pair in a hash.
Attacker Value
Unknown

CVE-2022-33941

Disclosure Date: September 08, 2022 (last updated October 08, 2023)
PowerCMS XMLRPC API provided by Alfasado Inc. contains a command injection vulnerability. Sending a specially crafted message by POST method to PowerCMS XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products/versions are as follows: PowerCMS 6.021 and earlier (PowerCMS 6 Series), PowerCMS 5.21 and earlier (PowerCMS 5 Series), and PowerCMS 4.51 and earlier (PowerCMS 4 Series). Note that all versions of PowerCMS 3 Series and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability.
Attacker Value
Unknown

CVE-2022-39051

Disclosure Date: September 05, 2022 (last updated October 08, 2023)
Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package
Attacker Value
Unknown

CVE-2022-38078

Disclosure Date: August 24, 2022 (last updated October 08, 2023)
Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability. Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products and versions are as follows: Movable Type 7 r.5202 and earlier, Movable Type Advanced 7 r.5202 and earlier, Movable Type 6.8.6 and earlier, Movable Type Advanced 6.8.6 and earlier, Movable Type Premium 1.52 and earlier, and Movable Type Premium Advanced 1.52 and earlier. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
Attacker Value
Unknown

CVE-2020-16093

Disclosure Date: July 18, 2022 (last updated October 07, 2023)
In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.
Attacker Value
Unknown

CVE-2022-31081

Disclosure Date: June 27, 2022 (last updated November 08, 2023)
HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be re…
Attacker Value
Unknown

CVE-2022-30688

Disclosure Date: May 17, 2022 (last updated October 07, 2023)
needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.
Attacker Value
Unknown

CVE-2021-41550

Disclosure Date: January 18, 2022 (last updated October 07, 2023)
Leostream Connection Broker 9.0.40.17 allows administrator to upload and execute Perl code.
Attacker Value
Unknown

CVE-2020-16155

Disclosure Date: December 13, 2021 (last updated October 07, 2023)
The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.