Show filters
333 Total Results
Displaying 61-70 of 333
Sort by:
Attacker Value
Unknown

CVE-2019-20919

Disclosure Date: September 17, 2020 (last updated November 08, 2023)
An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
Attacker Value
Unknown

CVE-2020-24045

Disclosure Date: September 17, 2020 (last updated October 07, 2023)
A sandbox escape issue was discovered in TitanHQ SpamTitan Gateway 7.07. It limits the admin user to a restricted shell, allowing execution of a small number of tools of the operating system. The restricted shell can be bypassed by presenting a fake vmware-tools ISO image to the guest virtual machine running SpamTitan Gateway. This ISO image should contain a valid Perl script at the vmware-freebsd-tools/vmware-tools-distrib/vmware-install.pl path. The fake ISO image will be mounted and the script wmware-install.pl will be executed with super-user privileges as soon as the hidden option to install VMware Tools is selected in the main menu of the restricted shell (option number 5). The contents of the script can be whatever the attacker wants, including a backdoor or similar.
Attacker Value
Unknown

CVE-2014-10402

Disclosure Date: September 16, 2020 (last updated October 07, 2023)
An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.
Attacker Value
Unknown

CVE-2020-14393

Disclosure Date: September 16, 2020 (last updated November 08, 2023)
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
Attacker Value
Unknown

CVE-2020-14392

Disclosure Date: September 16, 2020 (last updated November 08, 2023)
An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
Attacker Value
Unknown

CVE-2013-7491

Disclosure Date: September 11, 2020 (last updated October 07, 2023)
An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.
Attacker Value
Unknown

CVE-2013-7490

Disclosure Date: September 11, 2020 (last updated October 07, 2023)
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
Attacker Value
Unknown

CVE-2014-10401

Disclosure Date: September 11, 2020 (last updated October 07, 2023)
An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.
Attacker Value
Unknown

CVE-2020-17478

Disclosure Date: August 10, 2020 (last updated October 07, 2023)
ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.
Attacker Value
Unknown

CVE-2020-13895

Disclosure Date: June 07, 2020 (last updated October 06, 2023)
Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.