Page 6 of 27 results (0.002 seconds)

CVSS: 10.0EPSS: 3%CPEs: 2EXPL: 0

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character. Desbordamiento de búfer en la función win32_stat de ActivePerl de ActiveState, y Perl de Larry Wall anterior a 5.8.3 permite a atacantes remotos ejecutar comandos arbitrarios mediante nombres de fichero que terminan en un carácter "" (barra invertida). • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html http://marc.info/?l=bugtraq&m=108118694327979&w=2 http://public.activestate.com/cgi-bin/perlbrowse?patch=22552 http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities http://www.kb.cert.org/vuls/id/722414 https://exchange.xforce.ibmcloud.com/vulnerabilities/15732 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 4

suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence. • https://www.exploit-db.com/exploits/20141 https://www.exploit-db.com/exploits/20142 http://archives.neohapsis.com/archives/bugtraq/2000-08/0022.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0086.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0113.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0153.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-026.0.txt http://www.novell.com/linux/security/advisories/suse_security_announce •