Show filters
180 Total Results
Displaying 91-100 of 180
Sort by:
Attacker Value
Unknown

CVE-2013-7490

Disclosure Date: September 11, 2020 (last updated February 22, 2025)
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
Attacker Value
Unknown

CVE-2014-10401

Disclosure Date: September 11, 2020 (last updated February 22, 2025)
An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.
Attacker Value
Unknown

CVE-2020-17478

Disclosure Date: August 10, 2020 (last updated February 21, 2025)
ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.
Attacker Value
Unknown

CVE-2020-13895

Disclosure Date: June 07, 2020 (last updated February 21, 2025)
Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.
Attacker Value
Unknown

CVE-2020-12723

Disclosure Date: June 05, 2020 (last updated February 21, 2025)
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
Attacker Value
Unknown

CVE-2020-10878

Disclosure Date: June 05, 2020 (last updated February 21, 2025)
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
Attacker Value
Unknown

CVE-2020-10543

Disclosure Date: June 05, 2020 (last updated February 21, 2025)
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
Attacker Value
Unknown

CVE-2020-10674

Disclosure Date: March 18, 2020 (last updated February 21, 2025)
PerlSpeak through 2.01 allows attackers to execute arbitrary OS commands, as demonstrated by use of system and 2-argument open.
Attacker Value
Unknown

CVE-2010-3438

Disclosure Date: November 12, 2019 (last updated November 27, 2024)
libpoe-component-irc-perl before v6.32 does not remove carriage returns and line feeds. This can be used to execute arbitrary IRC commands by passing an argument such as "some text\rQUIT" to the 'privmsg' handler, which would cause the client to disconnect from the server.
Attacker Value
Unknown

CVE-2019-1010161

Disclosure Date: July 25, 2019 (last updated November 27, 2024)
perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.
0