日本語のみで絞り込む

条件を指定して検索しています。すべての条件を解除する

  • 最終更新日:1年以内
  • 2024/2/13 -DESCRIPTION. Spreadsheet::Read tries to transparently read *any* spreadsheet and return its content in a universal manner independent of the parsing module ...

    2024/1/3 -An attacker can trigger the vulnerability to execute arbitrary code on vulnerable ESG appliances through parameter injection.” No mention of specific version ...

    2023/12/30 -Download perl-Spreadsheet-ParseExcel-0.6600-1.el7.x86_64.rpm for CentOS 7, RHEL 7 from EPEL repository.

    2023/12/25 -Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) ...

    2023/7/6 -Meta-Wrapper for reading spreadsheet data with perl5 - Spreadsheet-Read/Read.pm at master · Tux/Spreadsheet-Read.

    2023/12/27 -CVE-2023-7102 resides within the use of a third-party Perl module “Spreadsheet ParseExcel”, which is used by the “Amavis” virus scanner in Barracuda Email ...

    2023/12/29 -On December 21, 2023, Barracuda deployed a security update to all active ESGs to address the ACE vulnerability in Spreadsheet::ParseExcel. ... Perl's qx operator ...

    2023/12/28 -The threat actor utilized an Arbitrary Code Execution (ACE) vulnerability within a third-party Perl module called 'Spreadsheet ParseExcel' to deploy a specially ...

    2024/1/3 -Spreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval.” Specifically, ...

    2023/12/27 -That said, the original flaw in the Spreadsheet::ParseExcel Perl module (version 0.65) remains unpatched and has been assigned the CVE identifier CVE-2023 ...