- EPSS 1.31%
- Veröffentlicht 29.10.2009 14:30:01
- Zuletzt bearbeitet 09.04.2025 00:30:58
Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.
CVE-2008-2827
- EPSS 0.1%
- Veröffentlicht 23.06.2008 19:41:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-04...
- EPSS 3.28%
- Veröffentlicht 24.04.2008 05:05:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain oper...
CVE-2005-3962
- EPSS 0.89%
- Veröffentlicht 01.12.2005 17:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an int...
CVE-1999-1386
- EPSS 0.17%
- Veröffentlicht 31.12.1999 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.
- EPSS 1.89%
- Veröffentlicht 29.05.1996 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.