Filtered by vendor Perl
Subscribe
Total
66 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-1927 | 1 Perl | 1 Perl | 2018-10-11 | 5.0 MEDIUM | N/A |
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems. | |||||
CVE-2014-4330 | 2 Data Dumper Project, Perl | 2 Data Dumper, Perl | 2018-10-09 | 2.1 LOW | N/A |
The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function. | |||||
CVE-2011-0761 | 1 Perl | 1 Perl | 2018-10-09 | 5.0 MEDIUM | N/A |
Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call. | |||||
CVE-2015-8853 | 2 Fedoraproject, Perl | 2 Fedora, Perl | 2018-05-02 | 5.0 MEDIUM | 7.5 HIGH |
The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80." | |||||
CVE-2013-7329 | 1 Perl | 1 Cgi Application Module | 2018-03-07 | 5.0 MEDIUM | N/A |
The CGI::Application module before 4.50_50 and 4.50_51 for Perl, when run modes are not specified, allows remote attackers to obtain sensitive information (web queries and environment details) via vectors related to the dump_html function. | |||||
CVE-2016-1246 | 3 Dbd-mysql Project, Debian, Perl | 3 Dbd-mysql, Debian Linux, Perl | 2017-11-13 | 5.0 MEDIUM | 7.5 HIGH |
Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message. | |||||
CVE-2006-7225 | 1 Perl | 1 Pcre | 2017-10-11 | 4.3 MEDIUM | N/A |
Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence. | |||||
CVE-2009-0663 | 2 Cmu, Perl | 2 Dbd\, Perl | 2017-09-29 | 7.5 HIGH | N/A |
Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows. | |||||
CVE-2013-1667 | 1 Perl | 1 Perl | 2017-09-19 | 7.5 HIGH | N/A |
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key. | |||||
CVE-2010-1168 | 2 Perl, Rafael Garcia-suarez | 2 Perl, Safe | 2017-09-19 | 7.5 HIGH | N/A |
The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods." | |||||
CVE-2012-1151 | 1 Perl | 1 Perl | 2017-08-29 | 5.0 MEDIUM | N/A |
Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function. | |||||
CVE-2011-1487 | 1 Perl | 1 Perl | 2017-08-17 | 5.0 MEDIUM | N/A |
The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string. | |||||
CVE-2009-3626 | 1 Perl | 1 Perl | 2017-08-17 | 5.0 MEDIUM | N/A |
Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match. | |||||
CVE-2008-2827 | 1 Perl | 1 Perl | 2017-08-08 | 4.6 MEDIUM | N/A |
The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452. | |||||
CVE-2003-1365 | 1 Perl | 1 Cgi Lite | 2017-07-29 | 5.0 MEDIUM | N/A |
The escape_dangerous_chars function in CGI::Lite 2.0 and earlier does not correctly remove special characters including (1) "\" (backslash), (2) "?", (3) "~" (tilde), (4) "^" (carat), (5) newline, or (6) carriage return, which could allow remote attackers to read or write arbitrary files, or execute arbitrary commands, in shell scripts that rely on CGI::Lite to filter such dangerous inputs. | |||||
CVE-2005-1349 | 1 Perl | 1 Convert Uulib | 2017-07-11 | 7.5 HIGH | N/A |
Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation. | |||||
CVE-2003-0618 | 2 Debian, Perl | 2 Debian Linux, Suidperl | 2017-07-11 | 2.1 LOW | N/A |
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions. | |||||
CVE-2013-7422 | 2 Apple, Perl | 2 Mac Os X, Perl | 2016-12-22 | 7.5 HIGH | N/A |
Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression. | |||||
CVE-2012-6329 | 1 Perl | 1 Perl | 2016-12-08 | 7.5 HIGH | N/A |
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6. | |||||
CVE-2012-5195 | 1 Perl | 1 Perl | 2016-12-08 | 7.5 HIGH | N/A |
Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator. |