Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2012-5526
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Perl CGI.pm ‘Set-Cookied’和‘P3P’头HTTP头注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CGI.pm是用途广泛的Perl模块,为编程公共网关接口(CGI)应用,提供一致API为接受用户输入和生产HTML或XHTML产品。 Perl CGI.pm早期版本至3.63版本中存在任意HTTP头注入漏洞,该漏洞源于没有充分验证用户提供的输入。攻击者利用该漏洞注入任意HTTP头到服务器响应。可发起跨站请求伪造,跨站脚本以及HTTP请求走私漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2012-5526
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2012-5526
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2012-5526

No comments yet


Leave a comment