Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
perl perl 5.8.3 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2004-0377
Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl prior to 5.8.3 allows local or remote malicious users to execute arbitrary commands via filenames that end in a backslash character.
Activestate Activeperl
Larry Wall Perl
7.5
CVSSv2
CVE-2013-1667
The rehash mechanism in Perl 5.8.2 up to and including 5.16.x allows context-dependent malicious users to cause a denial of service (memory consumption and crash) via a crafted hash key.
Perl Perl 5.8.2
Perl Perl 5.8.9
Perl Perl 5.8.10
Perl Perl 5.10
Perl Perl 5.11.4
Perl Perl 5.11.5
Perl Perl 5.12.0
Perl Perl 5.12.3
Perl Perl 5.13.7
Perl Perl 5.13.6
Perl Perl 5.13.10
Perl Perl 5.13.11
Perl Perl 5.14.0
Perl Perl 5.16.2
Perl Perl 5.8.5
Perl Perl 5.8.6
Perl Perl 5.10.0
Perl Perl 5.11.2
Perl Perl 5.11.3
Perl Perl 5.12.2
Perl Perl 5.12.1
Perl Perl 5.13.3
7.5
CVSSv2
CVE-2007-5116
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent malicious users to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Openpkg Openpkg Current
Redhat Enterprise Linux 1.0
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.6
Mandrakesoft Mandrake Multi Network Firewall 2.0
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
7.5
CVSSv2
CVE-2004-2286
Integer overflow in the duplication operator in ActivePerl allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
Activestate Activeperl 5.6.1
Activestate Activeperl 5.8.1
Activestate Activeperl 5.8.3
Larry Wall Perl 5.6.1
Activestate Activeperl 5.6.1.630
Activestate Activeperl 5.6.2
Larry Wall Perl 5.3
Larry Wall Perl 5.4
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.0
Activestate Activeperl 5.6.3
Activestate Activeperl 5.7.1
Activestate Activeperl 5.7.2
Larry Wall Perl 5.4.5
Larry Wall Perl 5.5
Activestate Activeperl 5.7.3
Activestate Activeperl 5.8
Larry Wall Perl 5.5.3
Larry Wall Perl 5.6
1 EDB exploit
7.2
CVSSv2
CVE-2016-1238
(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpa...
Debian Debian Linux 8.0
Fedoraproject Fedora 24
Fedoraproject Fedora 23
Perl Perl 5.003 92
Perl Perl 5.21.1
Perl Perl 5.9.3
Perl Perl 5.14.1
Perl Perl 5.8.0
Perl Perl 5.003 97
Perl Perl 5.6.0
Perl Perl 5.17.11
Perl Perl 5.24.1
Perl Perl 5.16.0
Perl Perl 5.19.6
Perl Perl 5.22.3
Perl Perl 5.17.4
Perl Perl 5.003 03
Perl Perl 5.18.4
Perl Perl 5.18.2
Perl Perl 5.8.4
Perl Perl 5.15.6
Perl Perl 5.004 04
4 Github repositories
7.2
CVSSv2
CVE-2005-4278
Untrusted search path vulnerability in Perl prior to 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Larry Wall Perl 5.4
Larry Wall Perl 5.4.5
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.3
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl
Larry Wall Perl 5.5
Larry Wall Perl 5.5.3
Larry Wall Perl 5.6.1
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
5.1
CVSSv2
CVE-2011-2939
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module prior to 2.44, as used in Perl prior to 5.15.6, might allow context-dependent malicious users to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap...
Perl Perl 5.14.1
Dan Kogai Encode Module 1.65
Dan Kogai Encode Module 1.56
Dan Kogai Encode Module 2.19
Dan Kogai Encode Module 2.08
Dan Kogai Encode Module
Dan Kogai Encode Module 1.74
Dan Kogai Encode Module 2.20
Dan Kogai Encode Module 0.96
Perl Perl 5.8.4
Perl Perl 5.12.0
Dan Kogai Encode Module 2.17
Dan Kogai Encode Module 1.77
Perl Perl 5.13.10
Dan Kogai Encode Module 1.97
Dan Kogai Encode Module 2.13
Dan Kogai Encode Module 1.95
Dan Kogai Encode Module 1.85
Perl Perl 5.8.1
Dan Kogai Encode Module 1.54
Dan Kogai Encode Module 2.35
Perl Perl 5.8.9
5
CVSSv2
CVE-2010-1158
Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent malicious users to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.
Perl Perl 5.8.1
Perl Perl 5.8.2
Perl Perl 5.8.3
Perl Perl 5.8.4
Perl Perl 5.8.8
Perl Perl 5.8.9
Perl Perl 5.8.7
Perl Perl 5.8.5
Perl Perl 5.8.6
4.3
CVSSv2
CVE-2011-2728
The bsd_glob function in the File::Glob module for Perl prior to 5.14.2 allows context-dependent malicious users to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
Perl Perl 5.13.0
Perl Perl 5.13.3
Perl Perl 5.13.2
Perl Perl 5.13.8
Perl Perl 5.12.3
Perl Perl 5.12.1
Perl Perl 5.10
Perl Perl 5.10.0
Perl Perl 5.10.1
Perl Perl 5.9.2
Perl Perl 2.18.1
Perl Perl 2.15.1
Perl Perl 2.15.0
Perl Perl 2.16.1
Perl Perl 2.7.1
Perl Perl 2.7.2
Perl Perl 2.8.0
Perl Perl 2.6.3
Perl Perl 2.10.3
Perl Perl 2.10.2
Perl Perl 2.10.1
Perl Perl 2.10.0
2.1
CVSSv2
CVE-2004-0976
Multiple scripts in the perl package in Trustix Secure Linux 1.5 up to and including 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
Larry Wall Perl 5.6
Larry Wall Perl 5.6.1
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »