Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2004-0377

Опубликовано: 04 мая 2004
Источник: debian
EPSS Средний

Описание

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
perlnot-affectedpackage

EPSS

Процентиль: 94%
0.14668
Средний

Связанные уязвимости

nvd
почти 22 года назад

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

github
почти 4 года назад

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

EPSS

Процентиль: 94%
0.14668
Средний