Perl

Perl

46 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 6.8%
  • Veröffentlicht 28.09.2017 01:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.

  • EPSS 2.59%
  • Veröffentlicht 19.09.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and th...

  • EPSS 3.87%
  • Veröffentlicht 19.09.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular exp...

Exploit
  • EPSS 2.19%
  • Veröffentlicht 07.02.2017 15:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 02.08.2016 14:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.

  • EPSS 0.27%
  • Veröffentlicht 02.08.2016 14:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpa...

  • EPSS 9.1%
  • Veröffentlicht 25.05.2016 15:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."

  • EPSS 18.02%
  • Veröffentlicht 08.04.2016 15:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.

  • EPSS 0.75%
  • Veröffentlicht 16.08.2015 23:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associa...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 30.09.2014 16:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Dumper method in Data::Dumper before 2.154, as used in Perl 5.20.1 and earlier, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers...