Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-0663

Опубликовано: 30 апр. 2009
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libdbd-pg-perlfixed2.1.3-1package

EPSS

Процентиль: 88%
0.04215
Низкий

Связанные уязвимости

ubuntu
около 16 лет назад

Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.

redhat
около 16 лет назад

Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.

nvd
около 16 лет назад

Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.

github
около 3 лет назад

Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.

oracle-oval
около 16 лет назад

ELSA-2009-0479: perl-DBD-Pg security update (MODERATE)

EPSS

Процентиль: 88%
0.04215
Низкий