Vulnerabilities > Perl
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-12-13 | CVE-2020-16156 | Improper Verification of Cryptographic Signature vulnerability in multiple products CPAN 2.28 allows Signature Verification Bypass. | 6.8 |
2020-09-17 | CVE-2019-20919 | NULL Pointer Dereference vulnerability in multiple products An issue was discovered in the DBI module before 1.643 for Perl. | 1.9 |
2020-09-16 | CVE-2014-10402 | Incorrect Permission Assignment for Critical Resource vulnerability in Perl DBI An issue was discovered in the DBI module through 1.643 for Perl. | 3.6 |
2020-09-16 | CVE-2020-14393 | Out-of-bounds Write vulnerability in multiple products A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. | 7.1 |
2020-09-16 | CVE-2020-14392 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. | 2.1 |
2020-09-11 | CVE-2013-7490 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products An issue was discovered in the DBI module before 1.632 for Perl. | 5.3 |
2020-06-05 | CVE-2020-12723 | Classic Buffer Overflow vulnerability in multiple products regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. | 5.0 |
2020-06-05 | CVE-2020-10878 | Integer Overflow or Wraparound vulnerability in multiple products Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. | 7.5 |
2020-06-05 | CVE-2020-10543 | Integer Overflow or Wraparound vulnerability in multiple products Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow. | 6.4 |
2018-12-07 | CVE-2018-18314 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations. | 7.5 |