Show filters
333 Total Results
Displaying 51-60 of 333
Sort by:
Attacker Value
Unknown

CVE-2020-16154

Disclosure Date: December 13, 2021 (last updated October 07, 2023)
The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass.
Attacker Value
Unknown

CVE-2021-36770

Disclosure Date: August 11, 2021 (last updated November 08, 2023)
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
Attacker Value
Unknown

CVE-2021-38589

Disclosure Date: August 11, 2021 (last updated October 07, 2023)
In cPanel before 96.0.13, scripts/fix-cpanel-perl does not properly restrict the overwriting of files (SEC-588).
Attacker Value
Unknown

CVE-2021-38588

Disclosure Date: August 11, 2021 (last updated October 07, 2023)
In cPanel before 96.0.13, fix_cpanel_perl lacks verification of the integrity of downloads (SEC-587).
Attacker Value
Unknown

CVE-2021-38587

Disclosure Date: August 11, 2021 (last updated October 07, 2023)
In cPanel before 96.0.13, scripts/fix-cpanel-perl mishandles the creation of temporary files (SEC-586).
Attacker Value
Unknown

CVE-2012-1102

Disclosure Date: July 09, 2021 (last updated October 07, 2023)
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
Attacker Value
Unknown

CVE-2021-29424

Disclosure Date: April 06, 2021 (last updated November 08, 2023)
The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
Attacker Value
Unknown

CVE-2021-29662

Disclosure Date: March 31, 2021 (last updated October 07, 2023)
The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
Attacker Value
Unknown

CVE-2020-36163

Disclosure Date: January 06, 2021 (last updated October 07, 2023)
An issue was discovered in Veritas NetBackup and OpsCenter through 8.3.0.1. NetBackup processes using Strawberry Perl attempt to load and execute libraries from paths that do not exist by default on the Windows operating system. By default, on Windows systems, users can create directories under C:\. If a low privileged user on the Windows system creates an affected path with a library that NetBackup attempts to load, they can execute arbitrary code as SYSTEM or Administrator. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc. This affects NetBackup master servers, media servers, clients, and OpsCenter servers on the Windows platform. The system is vulnerable during an install or upgrade on all systems and post-install on Master, Media, and OpsCenter servers during normal operations.
Attacker Value
Unknown

CVE-2020-26574

Disclosure Date: October 06, 2020 (last updated November 08, 2023)
Leostream Connection Broker 8.2.x is affected by stored XSS. An unauthenticated attacker can inject arbitrary JavaScript code via the webquery.pl User-Agent HTTP header. It is rendered by the admins the next time they log in. The JavaScript injected can be used to force the admin to upload a malicious Perl script that will be executed as root via libMisc::browser_client. NOTE: This vulnerability only affects products that are no longer supported by the maintainer