Vulnerabilities > Perl

DATE CVE VULNERABILITY TITLE RISK
2009-04-30 CVE-2009-0663 Buffer Errors vulnerability in CMU Dbd::Pg 1.49
Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.
network
low complexity
perl cmu CWE-119
7.5
2008-12-01 CVE-2008-5303 Race Condition vulnerability in Perl File::Path 1.08
Race condition in the rmtree function in File::Path 1.08 (lib/File/Path.pm) in Perl 5.8.8 allows local users to to delete arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827.
local
perl CWE-362
6.9
2008-12-01 CVE-2008-5302 Race Condition vulnerability in Perl File::Path 1.08/2.07
Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827.
local
perl CWE-362
6.9
2008-06-23 CVE-2008-2827 Permissions, Privileges, and Access Controls vulnerability in Perl 5.10
The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452.
local
low complexity
perl CWE-264
4.6
2008-04-24 CVE-2008-1927 Resource Management Errors vulnerability in Perl 5.8.8
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters.
network
low complexity
perl CWE-399
5.0
2007-12-03 CVE-2006-7225 Improper Input Validation vulnerability in Perl Pcre
Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.
network
perl CWE-20
4.3
2005-12-01 CVE-2005-3962 Numeric Errors vulnerability in Perl 5.8.6/5.9.2
Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
local
low complexity
perl CWE-189
4.6
2005-05-02 CVE-2005-1349 Buffer Overflow vulnerability in Convert-UUlib Perl Module
Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation.
network
low complexity
perl
7.5
2004-05-04 CVE-2003-0618 Information Disclosure vulnerability in Suidperl
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions.
local
low complexity
perl debian
2.1
2003-12-31 CVE-2003-1365 Improper Input Validation vulnerability in Perl CGI Lite 2.0
The escape_dangerous_chars function in CGI::Lite 2.0 and earlier does not correctly remove special characters including (1) "\" (backslash), (2) "?", (3) "~" (tilde), (4) "^" (carat), (5) newline, or (6) carriage return, which could allow remote attackers to read or write arbitrary files, or execute arbitrary commands, in shell scripts that rely on CGI::Lite to filter such dangerous inputs.
network
low complexity
perl CWE-20
5.0