Количество 12
Количество 12
CVE-2011-10007
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \ -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)
CVE-2011-10007
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \ -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)
CVE-2011-10007
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \ -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)
CVE-2011-10007
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code ...
SUSE-SU-2025:02105-1
Security update for perl-File-Find-Rule
ROS-20250929-03
Уязвимость perl-File-Find-Rule
GHSA-cvg9-q978-4569
File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \ -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users)
ELSA-2025-9741
ELSA-2025-9741: perl-File-Find-Rule security update (IMPORTANT)
ELSA-2025-9740
ELSA-2025-9740: perl-File-Find-Rule-Perl security update (IMPORTANT)
ELSA-2025-9605
ELSA-2025-9605: perl-File-Find-Rule security update (IMPORTANT)
ELSA-2025-9517
ELSA-2025-9517: perl-File-Find-Rule security update (IMPORTANT)
BDU:2025-12301
Уязвимость библиотеки Perl для поиска файлов File::Find::Rule, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2011-10007 File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \ -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users) | CVSS3: 8.8 | 0% Низкий | 5 месяцев назад | |
CVE-2011-10007 File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \ -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users) | CVSS3: 7.3 | 0% Низкий | 5 месяцев назад | |
CVE-2011-10007 File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \ -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users) | CVSS3: 8.8 | 0% Низкий | 5 месяцев назад | |
CVE-2011-10007 File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code ... | CVSS3: 8.8 | 0% Низкий | 5 месяцев назад | |
SUSE-SU-2025:02105-1 Security update for perl-File-Find-Rule | 0% Низкий | 4 месяца назад | ||
ROS-20250929-03 Уязвимость perl-File-Find-Rule | CVSS3: 8.8 | 0% Низкий | около 1 месяца назад | |
GHSA-cvg9-q978-4569 File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule \ -E 'File::Find::Rule->grep("foo")->in("/tmp/poc")' uid=1000(user) gid=1000(user) groups=1000(user),100(users) | CVSS3: 8.8 | 0% Низкий | 5 месяцев назад | |
ELSA-2025-9741 ELSA-2025-9741: perl-File-Find-Rule security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-9740 ELSA-2025-9740: perl-File-Find-Rule-Perl security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-9605 ELSA-2025-9605: perl-File-Find-Rule security update (IMPORTANT) | 4 месяца назад | |||
ELSA-2025-9517 ELSA-2025-9517: perl-File-Find-Rule security update (IMPORTANT) | 4 месяца назад | |||
BDU:2025-12301 Уязвимость библиотеки Perl для поиска файлов File::Find::Rule, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 8.8 | 0% Низкий | 5 месяцев назад |
Уязвимостей на страницу