Vulnerabilities > Perl
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2009-04-30 | CVE-2009-0663 | Buffer Errors vulnerability in CMU Dbd::Pg 1.49 Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows. | 7.5 |
2008-12-01 | CVE-2008-5303 | Race Condition vulnerability in Perl File::Path 1.08 Race condition in the rmtree function in File::Path 1.08 (lib/File/Path.pm) in Perl 5.8.8 allows local users to to delete arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. | 6.9 |
2008-12-01 | CVE-2008-5302 | Race Condition vulnerability in Perl File::Path 1.08/2.07 Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. | 6.9 |
2008-06-23 | CVE-2008-2827 | Permissions, Privileges, and Access Controls vulnerability in Perl 5.10 The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452. | 4.6 |
2008-04-24 | CVE-2008-1927 | Resource Management Errors vulnerability in Perl 5.8.8 Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. | 5.0 |
2007-12-03 | CVE-2006-7225 | Improper Input Validation vulnerability in Perl Pcre Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence. | 4.3 |
2005-12-01 | CVE-2005-3962 | Numeric Errors vulnerability in Perl 5.8.6/5.9.2 Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications. | 4.6 |
2005-05-02 | CVE-2005-1349 | Buffer Overflow vulnerability in Convert-UUlib Perl Module Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation. | 7.5 |
2004-05-04 | CVE-2003-0618 | Information Disclosure vulnerability in Suidperl Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions. | 2.1 |
2003-12-31 | CVE-2003-1365 | Improper Input Validation vulnerability in Perl CGI Lite 2.0 The escape_dangerous_chars function in CGI::Lite 2.0 and earlier does not correctly remove special characters including (1) "\" (backslash), (2) "?", (3) "~" (tilde), (4) "^" (carat), (5) newline, or (6) carriage return, which could allow remote attackers to read or write arbitrary files, or execute arbitrary commands, in shell scripts that rely on CGI::Lite to filter such dangerous inputs. | 5.0 |