Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2023-47038

Disclosure Date: December 18, 2023 (last updated May 30, 2024)
A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
Attacker Value
Unknown

CVE-2022-48522

Disclosure Date: August 22, 2023 (last updated October 08, 2023)
In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.
Attacker Value
Unknown

CVE-2011-0633

Disclosure Date: May 13, 2011 (last updated October 04, 2023)
The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated. NOTE: it could be argued that this is a design limitation of the Net::HTTPS API, and separate implementations should be independently assigned CVE identifiers for not working around this limitation. However, because this API was modified within LWP, a single CVE identifier has been assigned.
0
Attacker Value
Unknown

CVE-2010-2253

Disclosure Date: July 06, 2010 (last updated October 04, 2023)
lwp-download in libwww-perl before 5.835 does not reject downloads to filenames that begin with a . (dot) character, which allows remote servers to create or overwrite files via (1) a 3xx redirect to a URL with a crafted filename or (2) a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
0
Attacker Value
Unknown

CVE-2005-4278

Disclosure Date: December 16, 2005 (last updated February 22, 2025)
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
0
Attacker Value
Unknown

CVE-2005-0156

Disclosure Date: February 07, 2005 (last updated February 22, 2025)
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
0
Attacker Value
Unknown

CVE-2004-2286

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
0
Attacker Value
Unknown

CVE-1999-0034

Disclosure Date: May 29, 1997 (last updated February 22, 2025)
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
0