Page 6 of 28 results (0.012 seconds)

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. • ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U http://fedoranews.org/updates/FEDORA--.shtml http://marc.info/?l=bugtraq&m=110547693019788&w=2 http://secunia.com/advisories/12991 http://secunia.com/advisories/18517 http://secunia.com/advisories/55314 http://www.debian.org/security/2004/dsa-620 http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml http://www.redhat.com/support/errata/RHSA-2005-103.html http://www.redhat.com/support/er •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files. • http://fedoranews.org/updates/FEDORA--.shtml http://marc.info/?l=bugtraq&m=110547693019788&w=2 http://secunia.com/advisories/17661 http://secunia.com/advisories/18075 http://www.debian.org/security/2004/dsa-620 http://www.mandriva.com/security/advisories?name=MDKSA-2005:031 http://www.redhat.com/support/errata/RHSA-2005-881.html http://www.securityfocus.com/bid/11294 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https •

CVSS: 10.0EPSS: 3%CPEs: 2EXPL: 0

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character. Desbordamiento de búfer en la función win32_stat de ActivePerl de ActiveState, y Perl de Larry Wall anterior a 5.8.3 permite a atacantes remotos ejecutar comandos arbitrarios mediante nombres de fichero que terminan en un carácter "" (barra invertida). • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html http://marc.info/?l=bugtraq&m=108118694327979&w=2 http://public.activestate.com/cgi-bin/perlbrowse?patch=22552 http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities http://www.kb.cert.org/vuls/id/722414 https://exchange.xforce.ibmcloud.com/vulnerabilities/15732 •