Show filters
333 Total Results
Displaying 71-80 of 333
Sort by:
Attacker Value
Unknown

CVE-2020-12723

Disclosure Date: June 05, 2020 (last updated November 08, 2023)
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
Attacker Value
Unknown

CVE-2020-10878

Disclosure Date: June 05, 2020 (last updated November 08, 2023)
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
Attacker Value
Unknown

CVE-2020-10543

Disclosure Date: June 05, 2020 (last updated November 08, 2023)
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
Attacker Value
Unknown

CVE-2013-7488

Disclosure Date: April 07, 2020 (last updated November 08, 2023)
perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.
Attacker Value
Unknown

CVE-2014-7236

Disclosure Date: February 17, 2020 (last updated October 06, 2023)
Eval injection vulnerability in lib/TWiki/Plugins.pm in TWiki before 6.0.1 allows remote attackers to execute arbitrary Perl code via the debugenableplugins parameter to do/view/Main/WebHome.
Attacker Value
Unknown

CVE-2011-4115

Disclosure Date: January 31, 2020 (last updated October 06, 2023)
Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.
Attacker Value
Unknown

CVE-2011-4116

Disclosure Date: January 31, 2020 (last updated October 06, 2023)
_is_safe in the File::Temp module for Perl does not properly handle symlinks.
Attacker Value
Unknown

CVE-2011-4117

Disclosure Date: January 31, 2020 (last updated October 06, 2023)
The Batch::BatchRun module 1.03 for Perl does not properly handle temporary files.
Attacker Value
Unknown

CVE-2014-3230

Disclosure Date: January 28, 2020 (last updated October 06, 2023)
The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
Attacker Value
Unknown

CVE-2013-1437

Disclosure Date: January 28, 2020 (last updated October 06, 2023)
Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.