Search CVE reports
51 – 60 of 211 results
CVE-2020-12723
Low prioritySome fixes available 4 of 5
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. An application written in Perl would only be vulnerable to this flaw if it evaluates regular...
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
perl | — | — | Fixed | Fixed | Fixed |
CVE-2020-10878
Low prioritySome fixes available 4 of 5
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection. An...
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
perl | — | — | Fixed | Fixed | Fixed |
CVE-2020-10543
Low prioritySome fixes available 4 of 5
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow. An application written in Perl would only be vulnerable to this flaw if it...
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
perl | — | — | Fixed | Fixed | Fixed |
CVE-2013-7488
Low priorityperl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.
1 affected package
libconvert-asn1-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libconvert-asn1-perl | Not affected | Not affected | Vulnerable | Vulnerable | Vulnerable |
CVE-2020-10674
Medium priorityPerlSpeak through 2.01 allows attackers to execute arbitrary OS commands, as demonstrated by use of system and 2-argument open.
1 affected package
libperlspeak-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libperlspeak-perl | Not in release | Not in release | Not in release | Vulnerable | Vulnerable |
CVE-2011-4116
Low priority_is_safe in the File::Temp module for Perl does not properly handle symlinks.
2 affected packages
libfile-temp-perl, perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libfile-temp-perl | — | — | — | — | — |
perl | — | — | — | — | — |
CVE-2011-4115
Low priorityParallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.
1 affected package
libparallel-forkmanager-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libparallel-forkmanager-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
CVE-2013-1437
Low priorityEval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.
2 affected packages
libmodule-metadata-perl, perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libmodule-metadata-perl | — | — | — | — | — |
perl | — | — | — | — | — |
CVE-2013-4184
Low priorityNot in release
Perl module Data::UUID from CPAN version 1.219 vulnerable to symlink attacks
1 affected package
libdata-uuid-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libdata-uuid-perl | — | — | — | — | — |
CVE-2011-1933
Medium prioritySQL injection vulnerability in Jifty::DBI before 0.68.
1 affected package
libjifty-dbi-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libjifty-dbi-perl | — | — | — | — | — |