7.5
CVE-2020-12723
- EPSS 0.18%
- Veröffentlicht 05.06.2020 15:15:10
- Zuletzt bearbeitet 21.11.2024 05:00:08
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Netapp ≫ Oncommand Workflow Automation Version-
Netapp ≫ Snap Creator Framework Version-
Fedoraproject ≫ Fedora Version31
Oracle ≫ Communications Billing And Revenue Management Version12.0.0.2.0
Oracle ≫ Communications Billing And Revenue Management Version12.0.0.3.0
Oracle ≫ Communications Diameter Signaling Router Version >= 8.0.0 <= 8.5.0
Oracle ≫ Communications Eagle Application Processor Version >= 16.1.0 <= 16.4.0
Oracle ≫ Communications Eagle Lnp Application Processor Version10.1
Oracle ≫ Communications Eagle Lnp Application Processor Version10.2
Oracle ≫ Communications Lsms Version >= 13.1 <= 13.4
Oracle ≫ Communications Offline Mediation Controller Version12.0.0.3.0
Oracle ≫ Communications Performance Intelligence Center Version >= 10.3.0.0.0 <= 10.3.0.2.1
Oracle ≫ Communications Performance Intelligence Center Version >= 10.4.0.1.0 <= 10.4.0.3.1
Oracle ≫ Configuration Manager Version12.1.2.0.8
Oracle ≫ Enterprise Manager Base Platform Version13.4.0.0
Oracle ≫ Sd-wan Edge Version8.2
Oracle ≫ Sd-wan Edge Version9.0
Oracle ≫ Sd-wan Edge Version9.1
Oracle ≫ Tekelec Platform Distribution Version >= 7.4.0 <= 7.7.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.18% | 0.403 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.