Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-6329

EPSS 81.97% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2012-6329

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Perl 任意代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Perl 5.17.7之前版本中的Locale::Maketext实现中的_compile函数中存在漏洞,该漏洞源于在括号表示法编译过程中没有正确处理反斜线和完全限定的方法名。通过特制的输入到接收来自用户的翻译字符串的应用程序(如Twiki应用程序5.1.3版本以及Foswiki应用程序1.0.x至1.0.10和1.1.x至1.1.6版本),上下文相关的攻击者利用该漏洞执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2012-6329

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2012-6329

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-01-04 · 22 CVEs total

CVE-2012-5581LibTIFF 缓冲区错误漏洞
CVE-2012-6497Ruby on Rail Authlogic gem 信息泄露漏洞
CVE-2012-6496Ruby on Rails ‘ctive Record’组件SQL注入漏洞
CVE-2012-6090SWI-Prolog 多个基于栈的缓冲区溢出漏洞
CVE-2012-6089SWI-Prolog ‘canoniseFileName’函数多个栈溢出漏洞
CVE-2012-5976多个Asterisk产品栈溢出拒绝服务漏洞
CVE-2012-5977多个Asterisk产品拒绝服务漏洞
CVE-2012-6348Centrify Deployment Manager 任意文件重写漏洞
CVE-2012-6330TWiki和Foswiki ‘MAKETEXT’值多个安全漏洞
CVE-2012-5605Red Hat CloudForms 不正确设置缓存文件读取漏洞
CVE-2012-5603Red Hat CloudForms 安全绕过漏洞
CVE-2011-4316Red Hat Enterprise Virtualization Manager SPICE锁屏竞争条件漏洞
CVE-2012-5516Red Hat Enterprise Virtualization Manager 信息泄露漏洞
CVE-2012-4574Red Hat CloudForms 管理员密码泄露漏洞
CVE-2012-4556Red Hat Certificate System pki-tps系统TPS空证书搜索连接重置漏洞
CVE-2012-4555Red Hat Certificate System pki-tps系统中断令牌格式操作拒绝服务漏洞
CVE-2012-4543Red Hat Certificate System 多个跨站脚本漏洞
CVE-2012-3538Red Hat CloudForms 密码泄露漏洞
CVE-2012-2696Red Hat Enterprise Virtualization Manager 权限提升漏洞
CVE-2012-0861Red Hat Enterprise Virtualization Manager 加密问题漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2012-6329

No comments yet


Leave a comment