Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
perl vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-4777
The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent malicious users to cause a denial of service (assertion failure and application exit) via crafted input that is not properly...
Perl Perl 5.10
Perl Perl 5.14.0
Perl Perl 5.12.0
1 EDB exploit
9.8
CVSSv3
CVE-2017-12814
Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl prior to 5.24.3-RC1 and 5.26.x prior to 5.26.1-RC1 on Windows allows malicious users to execute arbitrary code via a long environment variable.
Perl Perl
Perl Perl 5.26.0
7.5
CVSSv3
CVE-2017-12837
Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 prior to 5.24.3-RC1 and 5.26.x prior to 5.26.1-RC1 allows remote malicious users to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-ins...
Perl Perl 5.26.0
Perl Perl
9.1
CVSSv3
CVE-2017-12883
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 prior to 5.24.3-RC1 and 5.26.x prior to 5.26.1-RC1 allows remote malicious users to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an inva...
Perl Perl 5.26.0
Perl Perl
NA
CVE-2011-0761
Perl 5.10.x allows context-dependent malicious users to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) tell...
Perl Perl 5.10.0
Perl Perl 5.10.1
1 EDB exploit
NA
CVE-2005-3962
Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows malicious users to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a...
Perl Perl 5.9.2
Perl Perl 5.8.6
NA
CVE-2005-4278
Untrusted search path vulnerability in Perl prior to 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Larry Wall Perl 5.8.0
Larry Wall Perl 5.4
Larry Wall Perl 5.5
Larry Wall Perl 5.8.4.2
Larry Wall Perl
Larry Wall Perl 5.8.4
Larry Wall Perl 5.6.1
Larry Wall Perl 5.8.4.5
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.5.3
Larry Wall Perl 5.3
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.1
Larry Wall Perl 5.4.5
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.3
NA
CVE-2011-0633
The Net::HTTPS module in libwww-perl (LWP) prior to 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remot...
Search.cpan Libwww-perl 5.40 01
Search.cpan Libwww-perl
Gisle Aas Libwww-perl 5.828
Gisle Aas Libwww-perl 5.827
Gisle Aas Libwww-perl 5.826
Gisle Aas Libwww-perl 5.825
Gisle Aas Libwww-perl 5.811
Gisle Aas Libwww-perl 5.810
Gisle Aas Libwww-perl 5.808
Gisle Aas Libwww-perl 5.807
Gisle Aas Libwww-perl 5.74
Gisle Aas Libwww-perl 5.73
Gisle Aas Libwww-perl 5.72
Gisle Aas Libwww-perl 5.71
Gisle Aas Libwww-perl 5.53 92
Gisle Aas Libwww-perl 5.53 91
Gisle Aas Libwww-perl 5.53 90
Gisle Aas Libwww-perl 5.53
Gisle Aas Libwww-perl 5.52
Gisle Aas Libwww-perl 5.36
Gisle Aas Libwww-perl 5.35
Gisle Aas Libwww-perl 5.34
NA
CVE-2010-2253
lwp-download in libwww-perl prior to 5.835 does not reject downloads to filenames that begin with a . (dot) character, which allows remote servers to create or overwrite files via (1) a 3xx redirect to a URL with a crafted filename or (2) a Content-Disposition header that suggest...
Search.cpan Libwww-perl 5.40 01
Search.cpan Libwww-perl
Gisle Aas Libwww-perl 5.828
Gisle Aas Libwww-perl 5.827
Gisle Aas Libwww-perl 5.826
Gisle Aas Libwww-perl 5.825
Gisle Aas Libwww-perl 5.811
Gisle Aas Libwww-perl 5.810
Gisle Aas Libwww-perl 5.808
Gisle Aas Libwww-perl 5.807
Gisle Aas Libwww-perl 5.74
Gisle Aas Libwww-perl 5.73
Gisle Aas Libwww-perl 5.72
Gisle Aas Libwww-perl 5.71
Gisle Aas Libwww-perl 5.53 92
Gisle Aas Libwww-perl 5.53 91
Gisle Aas Libwww-perl 5.53 90
Gisle Aas Libwww-perl 5.53
Gisle Aas Libwww-perl 5.52
Gisle Aas Libwww-perl 5.36
Gisle Aas Libwww-perl 5.35
Gisle Aas Libwww-perl 5.34
NA
CVE-2009-1341
Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module prior to 2.0.0 for Perl allows context-dependent malicious users to cause a denial of service (memory consumption) by fetching data with BYTEA columns.
Debian Libdbd-pg-perl 1.4.0
Debian Libdbd-pg-perl 1.4.4
Debian Libdbd-pg-perl 0.95
Debian Libdbd-pg-perl 0.62
Debian Libdbd-pg-perl 1.3.1
Debian Libdbd-pg-perl 0.68
Debian Libdbd-pg-perl 1.2.2
Debian Libdbd-pg-perl 0.71
Debian Libdbd-pg-perl 0.88
Debian Libdbd-pg-perl 0.72
Debian Libdbd-pg-perl 1.4.6
Debian Libdbd-pg-perl 1.2.0
Debian Libdbd-pg-perl 0.94
Debian Libdbd-pg-perl 0.80
Debian Libdbd-pg-perl 0.52
Debian Libdbd-pg-perl 1.4.7
Debian Libdbd-pg-perl 0.73
Debian Libdbd-pg-perl 0.5
Debian Libdbd-pg-perl 0.89
Debian Libdbd-pg-perl 1.4.8
Debian Libdbd-pg-perl 1.0.0
Debian Libdbd-pg-perl 0.65
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »