Show filters
180 Total Results
Displaying 91-100 of 180
Sort by:
Attacker Value
Unknown
CVE-2013-7490
Disclosure Date: September 11, 2020 (last updated February 22, 2025)
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
0
Attacker Value
Unknown
CVE-2014-10401
Disclosure Date: September 11, 2020 (last updated February 22, 2025)
An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.
0
Attacker Value
Unknown
CVE-2020-17478
Disclosure Date: August 10, 2020 (last updated February 21, 2025)
ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.
0
Attacker Value
Unknown
CVE-2020-13895
Disclosure Date: June 07, 2020 (last updated February 21, 2025)
Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.
0
Attacker Value
Unknown
CVE-2020-12723
Disclosure Date: June 05, 2020 (last updated February 21, 2025)
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
0
Attacker Value
Unknown
CVE-2020-10878
Disclosure Date: June 05, 2020 (last updated February 21, 2025)
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
0
Attacker Value
Unknown
CVE-2020-10543
Disclosure Date: June 05, 2020 (last updated February 21, 2025)
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
0
Attacker Value
Unknown
CVE-2020-10674
Disclosure Date: March 18, 2020 (last updated February 21, 2025)
PerlSpeak through 2.01 allows attackers to execute arbitrary OS commands, as demonstrated by use of system and 2-argument open.
0
Attacker Value
Unknown
CVE-2010-3438
Disclosure Date: November 12, 2019 (last updated November 27, 2024)
libpoe-component-irc-perl before v6.32 does not remove carriage returns and line feeds. This can be used to execute arbitrary IRC commands by passing an argument such as "some text\rQUIT" to the 'privmsg' handler, which would cause the client to disconnect from the server.
0
Attacker Value
Unknown
CVE-2019-1010161
Disclosure Date: July 25, 2019 (last updated November 27, 2024)
perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.
0