Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation.
References
Configurations
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/15130 - Patch | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200504-26.xml - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:022 - | |
References | () http://www.securityfocus.com/bid/13401 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/20275 - |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1349
Mitre link : CVE-2005-1349
CVE.ORG link : CVE-2005-1349
JSON object : View
Products Affected
perl
- convert_uulib
CWE