Filtered by vendor Perl
Subscribe
Total
66 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2011-2728 | 1 Perl | 1 Perl | 2024-11-21 | 4.3 MEDIUM | N/A |
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. | |||||
CVE-2011-2201 | 2 Mark Stosberg, Perl | 2 Data\, Perl | 2024-11-21 | 4.3 MEDIUM | N/A |
The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input. | |||||
CVE-2011-1487 | 1 Perl | 1 Perl | 2024-11-21 | 5.0 MEDIUM | N/A |
The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string. | |||||
CVE-2011-0761 | 1 Perl | 1 Perl | 2024-11-21 | 5.0 MEDIUM | N/A |
Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call. | |||||
CVE-2010-4777 | 1 Perl | 1 Perl | 2024-11-21 | 4.3 MEDIUM | N/A |
The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash. | |||||
CVE-2010-1168 | 2 Perl, Rafael Garcia-suarez | 2 Perl, Safe | 2024-11-21 | 7.5 HIGH | N/A |
The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods." | |||||
CVE-2010-1158 | 1 Perl | 1 Perl | 2024-11-21 | 5.0 MEDIUM | N/A |
Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string. | |||||
CVE-2009-3626 | 1 Perl | 1 Perl | 2024-11-21 | 5.0 MEDIUM | N/A |
Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match. | |||||
CVE-2009-1884 | 2 Bzip, Perl | 2 Compress-raw-bzip2, Perl | 2024-11-21 | 4.3 MEDIUM | N/A |
Off-by-one error in the bzinflate function in Bzip2.xs in the Compress-Raw-Bzip2 module before 2.018 for Perl allows context-dependent attackers to cause a denial of service (application hang or crash) via a crafted bzip2 compressed stream that triggers a buffer overflow, a related issue to CVE-2009-1391. | |||||
CVE-2009-0663 | 2 Cmu, Perl | 2 Dbd\, Perl | 2024-11-21 | 7.5 HIGH | N/A |
Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows. | |||||
CVE-2008-5303 | 1 Perl | 2 File\, Perl | 2024-11-21 | 6.9 MEDIUM | N/A |
Race condition in the rmtree function in File::Path 1.08 (lib/File/Path.pm) in Perl 5.8.8 allows local users to to delete arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5302 due to affected versions. | |||||
CVE-2008-5302 | 1 Perl | 2 File\, Perl | 2024-11-21 | 6.9 MEDIUM | N/A |
Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5303 due to affected versions. | |||||
CVE-2008-2827 | 1 Perl | 1 Perl | 2024-11-21 | 4.6 MEDIUM | N/A |
The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452. | |||||
CVE-2008-1927 | 1 Perl | 1 Perl | 2024-11-21 | 5.0 MEDIUM | N/A |
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems. | |||||
CVE-2006-7225 | 1 Perl | 1 Pcre | 2024-11-21 | 4.3 MEDIUM | N/A |
Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence. | |||||
CVE-2005-3962 | 1 Perl | 1 Perl | 2024-11-21 | 4.6 MEDIUM | N/A |
Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications. | |||||
CVE-2005-1349 | 1 Perl | 1 Convert Uulib | 2024-11-20 | 7.5 HIGH | N/A |
Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation. | |||||
CVE-2003-1365 | 1 Perl | 1 Cgi Lite | 2024-11-20 | 5.0 MEDIUM | N/A |
The escape_dangerous_chars function in CGI::Lite 2.0 and earlier does not correctly remove special characters including (1) "\" (backslash), (2) "?", (3) "~" (tilde), (4) "^" (carat), (5) newline, or (6) carriage return, which could allow remote attackers to read or write arbitrary files, or execute arbitrary commands, in shell scripts that rely on CGI::Lite to filter such dangerous inputs. | |||||
CVE-2003-0618 | 2 Debian, Perl | 2 Debian Linux, Suidperl | 2024-11-20 | 2.1 LOW | N/A |
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions. | |||||
CVE-1999-1386 | 1 Perl | 1 Perl | 2024-11-20 | 2.1 LOW | 5.5 MEDIUM |
Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file. |