Quantcast
Channel: Latest security vulnerabilities Perl products
Viewing all articles
Browse latest Browse all 54

CVE-2003-1365

$
0
0
The escape_dangerous_chars function in CGI::Lite 2.0 and earlier does not correctly remove special characters including (1) "\" (backslash), (2) "?", (3) "~" (tilde), (4) "^" (carat), (5) newline, or (6) carriage return, which could allow remote attackers to read or write arbitrary files, or execute arbitrary commands, in shell scripts that rely on CGI::Lite to filter such dangerous inputs. (CVSS:5.0) (Last Update:2008-09-05)

Viewing all articles
Browse latest Browse all 54

Trending Articles