Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1168

Опубликовано: 21 июн. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."

РелизСтатусПримечание
dapper

released

5.8.7-10ubuntu1.3
devel

not-affected

5.12.3-6ubuntu4
hardy

released

5.8.8-12ubuntu0.5
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

released

5.10.1-8ubuntu2.1
maverick

released

5.10.1-12ubuntu2.1
natty

released

5.10.1-17ubuntu4.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 87%
0.03254
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
около 15 лет назад

The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."

nvd
около 15 лет назад

The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."

debian
около 15 лет назад

The Safe (aka Safe.pm) module before 2.25 for Perl allows context-depe ...

github
около 3 лет назад

The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."

oracle-oval
около 15 лет назад

ELSA-2010-0458: perl security update (MODERATE)

EPSS

Процентиль: 87%
0.03254
Низкий

7.5 High

CVSS2