Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rm2p-jhqp-33q2

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

EPSS

Процентиль: 93%
0.10187
Средний

Связанные уязвимости

nvd
больше 21 года назад

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

debian
больше 21 года назад

Buffer overflow in the win32_stat function for (1) ActiveState's Activ ...

EPSS

Процентиль: 93%
0.10187
Средний