3 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 22EXPL: 0

The #sinclude directive in Embedded Perl (ePerl) 2.2.14 and earlier allows a remote attacker to execute arbitrary code by modifying the 'sinclude' file to point to another file that contains a #include directive that references a file that contains the code. • http://www.securityfocus.com/archive/1/192711 http://www.securityfocus.com/bid/2912 https://exchange.xforce.ibmcloud.com/vulnerabilities/6743 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Multiple buffer overflows in ePerl before 2.2.14-0.7 allow local and remote attackers to execute arbitrary commands. • http://www.debian.org/security/2001/dsa-034 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-027.php3 http://www.novell.com/linux/security/advisories/2001_008_eperl.html http://www.securityfocus.com/bid/2464 https://exchange.xforce.ibmcloud.com/vulnerabilities/6198 •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 1

ePerl 2.2.12 allows remote attackers to read arbitrary files and possibly execute certain commands by specifying a full pathname of the target file as an argument to bar.phtml. • https://www.exploit-db.com/exploits/19120 http://marc.info/?l=bugtraq&m=90221104525890&w=2 http://marc.info/?l=bugtraq&m=90221104525927&w=2 http://www.securityfocus.com/bid/151 •