Show filters
141 Total Results
Displaying 11-20 of 141
Sort by:
Attacker Value
Unknown
CVE-2023-31486
Disclosure Date: April 29, 2023 (last updated October 08, 2023)
HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
0
Attacker Value
Unknown
CVE-2022-35253
Disclosure Date: September 23, 2022 (last updated November 08, 2023)
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2022. Notes: none.
0
Attacker Value
Unknown
CVE-2022-36564
Disclosure Date: August 30, 2022 (last updated October 08, 2023)
Incorrect access control in the install directory (C:\Strawberry) of StrawberryPerl v5.32.1.1 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
0
Attacker Value
Unknown
CVE-2022-2600
Disclosure Date: August 22, 2022 (last updated October 08, 2023)
The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel="noopener noreferer" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object.
0
Attacker Value
Unknown
CVE-2020-16156
Disclosure Date: December 13, 2021 (last updated October 07, 2023)
CPAN 2.28 allows Signature Verification Bypass.
0
Attacker Value
Unknown
CVE-2021-24627
Disclosure Date: November 08, 2021 (last updated November 28, 2024)
The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an 'id' GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection
0
Attacker Value
Unknown
CVE-2020-17478
Disclosure Date: August 10, 2020 (last updated October 07, 2023)
ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.
0
Attacker Value
Unknown
CVE-2020-13895
Disclosure Date: June 07, 2020 (last updated November 28, 2024)
Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.
0
Attacker Value
Unknown
CVE-2020-12723
Disclosure Date: June 05, 2020 (last updated November 08, 2023)
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
0
Attacker Value
Unknown
CVE-2020-10878
Disclosure Date: June 05, 2020 (last updated November 08, 2023)
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
0