Vulnerabilities (CVE)

Filtered by vendor Perl Subscribe
Total 66 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2003-0618 2 Debian, Perl 2 Debian Linux, Suidperl 2024-11-20 2.1 LOW N/A
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions.
CVE-1999-1386 1 Perl 1 Perl 2024-11-20 2.1 LOW 5.5 MEDIUM
Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.
CVE-2023-47039 2 Microsoft, Perl 2 Windows, Perl 2024-11-06 N/A 7.8 HIGH
A vulnerability was found in Perl. This security issue occurs while Perl for Windows relies on the system path environment variable to find the shell (`cmd.exe`). When running an executable that uses the Windows Perl interpreter, Perl attempts to find and execute `cmd.exe` within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory. This flaw allows an attacker with limited privileges to place`cmd.exe` in locations with weak permissions, such as `C:\ProgramData`. By doing so, arbitrary code can be executed when an administrator attempts to use this executable from these compromised locations.
CVE-2023-47038 2 Perl, Redhat 2 Perl, Enterprise Linux 2024-09-16 N/A 7.8 HIGH
A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
CVE-2023-47100 1 Perl 1 Perl 2024-02-28 N/A 9.8 CRITICAL
In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.
CVE-2022-48522 1 Perl 1 Perl 2024-02-28 N/A 9.8 CRITICAL
In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.