Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
perl perl vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2021-29424
The Net::Netmask module prior to 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows malicious users to bypass access control that is based on IP addresses.
Net\\ \\ Netmask Project
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
7.5
CVSSv3
CVE-2021-29662
The Data::Validate::IP module up to and including 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows malicious users to bypass access control that is based on IP addresses.
Data\\ \\ Validate\\
Netapp Snapcenter -
7.5
CVSSv3
CVE-2020-17478
ECDSA/EC/Point.pm in Crypt::Perl prior to 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.
P5-crypt-perl Project P5-crypt-perl
1 Github repository
7.5
CVSSv3
CVE-2020-12723
regcomp.c in Perl prior to 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
Perl Perl
Netapp Snap Creator Framework -
Netapp Oncommand Workflow Automation -
Fedoraproject Fedora 31
Opensuse Leap 15.1
Oracle Communications Eagle Lnp Application Processor 10.1
Oracle Communications Eagle Lnp Application Processor 10.2
Oracle Sd-wan Edge 9.0
Oracle Sd-wan Edge 8.2
Oracle Enterprise Manager Base Platform 13.4.0.0
Oracle Communications Billing And Revenue Management 12.0.0.3.0
Oracle Communications Offline Mediation Controller 12.0.0.3.0
Oracle Communications Billing And Revenue Management 12.0.0.2.0
Oracle Communications Diameter Signaling Router
Oracle Tekelec Platform Distribution
Oracle Communications Lsms
Oracle Configuration Manager 12.1.2.0.8
Oracle Sd-wan Edge 9.1
Oracle Communications Eagle Application Processor
Oracle Communications Performance Intelligence Center
7.5
CVSSv3
CVE-2013-7488
perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) up to and including 0.27 allows remote malicious users to cause an infinite loop via unexpected input.
Convert\\ \\ Asn1 Project
Fedoraproject Fedora 32
Fedoraproject Fedora 33
7.5
CVSSv3
CVE-2011-4115
Parallel::ForkManager module prior to 1.0.0 for Perl does not properly handle temporary files.
Cpan Parallel\\ \\
7.5
CVSSv3
CVE-2011-4116
_is_safe in the File::Temp module for Perl does not properly handle symlinks.
Cpan File\\ \\
2 Github repositories
7.5
CVSSv3
CVE-2011-4117
The Batch::BatchRun module 1.03 for Perl does not properly handle temporary files.
Cpan Batch\\ \\
7.5
CVSSv3
CVE-2019-12420
In Apache SpamAssassin prior to 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.
Apache Spamassassin
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
7.5
CVSSv3
CVE-2015-3406
The PGP signature parsing in Module::Signature prior to 0.74 allows remote malicious users to cause the unsigned portion of a SIGNATURE file to be treated as the signed portion via unspecified vectors.
Module-signature Project Module-signature
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 15.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »