Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2008-1927

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-23 Apr, 2008 | 17:00
Updated At-07 Aug, 2024 | 08:41
Rejected At-
Credits

Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:23 Apr, 2008 | 17:00
Updated At:07 Aug, 2024 | 08:41
Rejected At:
â–¼CVE Numbering Authority (CNA)

Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/2424
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31328
third-party-advisory
x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
vendor-advisory
x_refsource_FEDORA
http://osvdb.org/44588
vdb-entry
x_refsource_OSVDB
http://wiki.rpath.com/Advisories:rPSA-2009-0011
x_refsource_CONFIRM
http://secunia.com/advisories/33937
third-party-advisory
x_refsource_SECUNIA
http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2008-0532.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
vdb-entry
x_refsource_XF
http://www.ubuntu.com/usn/usn-700-1
vendor-advisory
x_refsource_UBUNTU
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
vdb-entry
signature
x_refsource_OVAL
http://support.apple.com/kb/HT3438
x_refsource_CONFIRM
http://secunia.com/advisories/29948
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
vendor-advisory
x_refsource_APPLE
http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
vendor-advisory
x_refsource_GENTOO
http://www.securitytracker.com/id?1020253
vdb-entry
x_refsource_SECTRACK
http://www.vupen.com/english/advisories/2008/2361
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31467
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0522.html
vendor-advisory
x_refsource_REDHAT
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
vendor-advisory
x_refsource_FEDORA
http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
x_refsource_CONFIRM
http://secunia.com/advisories/33314
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0422
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/31604
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2008-0013.html
x_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
x_refsource_CONFIRM
http://www.securityfocus.com/bid/28928
vdb-entry
x_refsource_BID
http://www.securityfocus.com/archive/1/500210/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/30624
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30025
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-700-2
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/30326
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
vendor-advisory
x_refsource_MANDRIVA
http://www.debian.org/security/2008/dsa-1556
vendor-advisory
x_refsource_DEBIAN
http://www.ipcop.org/index.php?name=News&file=article&sid=41
x_refsource_CONFIRM
http://secunia.com/advisories/31208
third-party-advisory
x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2265/references
vdb-entry
x_refsource_VUPEN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.vupen.com/english/advisories/2008/2424
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31328
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://osvdb.org/44588
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0011
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/33937
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
Resource:
x_refsource_MISC
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0532.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.ubuntu.com/usn/usn-700-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://support.apple.com/kb/HT3438
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/29948
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.securitytracker.com/id?1020253
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.vupen.com/english/advisories/2008/2361
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31467
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0522.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
Resource:
vendor-advisory
x_refsource_FEDORA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/33314
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2009/0422
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://secunia.com/advisories/31604
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0013.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/28928
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securityfocus.com/archive/1/500210/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/30624
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30025
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-700-2
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/30326
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.debian.org/security/2008/dsa-1556
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=41
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31208
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vupen.com/english/advisories/2008/2265/references
Resource:
vdb-entry
x_refsource_VUPEN
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2008/2424
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31328
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://osvdb.org/44588
vdb-entry
x_refsource_OSVDB
x_transferred
http://wiki.rpath.com/Advisories:rPSA-2009-0011
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/33937
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
x_refsource_MISC
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0532.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/31687
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
vdb-entry
x_refsource_XF
x_transferred
http://www.ubuntu.com/usn/usn-700-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://support.apple.com/kb/HT3438
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/29948
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.securitytracker.com/id?1020253
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.vupen.com/english/advisories/2008/2361
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31467
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0522.html
vendor-advisory
x_refsource_REDHAT
x_transferred
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
vendor-advisory
x_refsource_FEDORA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/33314
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2009/0422
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/31604
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2008-0013.html
x_refsource_CONFIRM
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/28928
vdb-entry
x_refsource_BID
x_transferred
http://www.securityfocus.com/archive/1/500210/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/30624
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30025
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-700-2
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/30326
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.debian.org/security/2008/dsa-1556
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.ipcop.org/index.php?name=News&file=article&sid=41
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31208
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vupen.com/english/advisories/2008/2265/references
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2424
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31328
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://osvdb.org/44588
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0011
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/33937
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0532.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/31687
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-700-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://support.apple.com/kb/HT3438
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/29948
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020253
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2361
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31467
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0522.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
Resource:
vendor-advisory
x_refsource_FEDORA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/33314
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2009/0422
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://secunia.com/advisories/31604
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0013.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/28928
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/500210/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/30624
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30025
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-700-2
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/30326
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1556
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=41
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31208
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2008/2265/references
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:24 Apr, 2008 | 05:05
Updated At:23 Apr, 2026 | 00:35

Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

perl
perl
>>perl>>5.8.8
cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
CWE ID: CWE-399
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792cve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlcve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlcve@mitre.org
N/A
http://osvdb.org/44588cve@mitre.org
N/A
http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156cve@mitre.org
N/A
http://secunia.com/advisories/29948cve@mitre.org
N/A
http://secunia.com/advisories/30025cve@mitre.org
N/A
http://secunia.com/advisories/30326cve@mitre.org
N/A
http://secunia.com/advisories/30624cve@mitre.org
N/A
http://secunia.com/advisories/31208cve@mitre.org
N/A
http://secunia.com/advisories/31328cve@mitre.org
N/A
http://secunia.com/advisories/31467cve@mitre.org
N/A
http://secunia.com/advisories/31604cve@mitre.org
N/A
http://secunia.com/advisories/31687cve@mitre.org
N/A
http://secunia.com/advisories/33314cve@mitre.org
N/A
http://secunia.com/advisories/33937cve@mitre.org
N/A
http://support.apple.com/kb/HT3438cve@mitre.org
N/A
http://support.avaya.com/elmodocs2/security/ASA-2008-317.htmcve@mitre.org
N/A
http://support.avaya.com/elmodocs2/security/ASA-2008-361.htmcve@mitre.org
N/A
http://wiki.rpath.com/Advisories:rPSA-2009-0011cve@mitre.org
N/A
http://www.debian.org/security/2008/dsa-1556cve@mitre.org
N/A
http://www.gentoo.org/security/en/glsa/glsa-200805-17.xmlcve@mitre.org
N/A
http://www.ipcop.org/index.php?name=News&file=article&sid=41cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2008:100cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0522.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2008-0532.htmlcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/500210/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/28928cve@mitre.org
N/A
http://www.securitytracker.com/id?1020253cve@mitre.org
N/A
http://www.ubuntu.com/usn/usn-700-1cve@mitre.org
N/A
http://www.ubuntu.com/usn/usn-700-2cve@mitre.org
N/A
http://www.vmware.com/security/advisories/VMSA-2008-0013.htmlcve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2265/referencescve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2361cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2008/2424cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/0422cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/41996cve@mitre.org
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579cve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.htmlcve@mitre.org
N/A
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://osvdb.org/44588af854a3a-2127-422b-91ae-364da2661108
N/A
http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/29948af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/30025af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/30326af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/30624af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/31208af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/31328af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/31467af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/31604af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/31687af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/33314af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/33937af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.apple.com/kb/HT3438af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2008-317.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://support.avaya.com/elmodocs2/security/ASA-2008-361.htmaf854a3a-2127-422b-91ae-364da2661108
N/A
http://wiki.rpath.com/Advisories:rPSA-2009-0011af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2008/dsa-1556af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.gentoo.org/security/en/glsa/glsa-200805-17.xmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ipcop.org/index.php?name=News&file=article&sid=41af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2008:100af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2008-0522.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2008-0532.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/500210/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/28928af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id?1020253af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/usn-700-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/usn-700-2af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/security/advisories/VMSA-2008-0013.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2008/2265/referencesaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2008/2361af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2008/2424af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2009/0422af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/41996af854a3a-2127-422b-91ae-364da2661108
N/A
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://osvdb.org/44588
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/29948
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30025
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30326
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/30624
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31208
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31328
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31467
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31604
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/31687
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/33314
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/33937
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3438
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0011
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1556
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=41
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0522.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0532.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/500210/100/0/threaded
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/28928
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1020253
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-700-1
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-700-2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0013.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2265/references
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2361
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2424
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/0422
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://osvdb.org/44588
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/29948
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/30025
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/30326
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/30624
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/31208
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/31328
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/31467
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/31604
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/31687
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/33314
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/33937
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.apple.com/kb/HT3438
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://wiki.rpath.com/Advisories:rPSA-2009-0011
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2008/dsa-1556
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ipcop.org/index.php?name=News&file=article&sid=41
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:100
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0522.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0532.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/500210/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/28928
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1020253
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-700-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/usn-700-2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2008-0013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2265/references
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2361
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2008/2424
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vupen.com/english/advisories/2009/0422
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/41996
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2013-7491
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.39% / 59.72%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 18:37
Updated-06 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.

Action-Not Available
Vendor-perln/a
Product-dbin/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2013-7490
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.39% / 60.20%
||
7 Day CHG~0.00%
Published-11 Sep, 2020 | 18:37
Updated-06 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.

Action-Not Available
Vendor-perln/aCanonical Ltd.
Product-ubuntu_linuxdbin/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2010-1158
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-0.53% / 67.44%
||
7 Day CHG~0.00%
Published-20 Apr, 2010 | 15:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.

Action-Not Available
Vendor-perln/a
Product-perln/a
CVE-2017-12837
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-3.16% / 87.01%
||
7 Day CHG~0.00%
Published-19 Sep, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier.

Action-Not Available
Vendor-perln/a
Product-perln/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2011-0761
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-5||MEDIUM
EPSS-3.40% / 87.49%
||
7 Day CHG~0.00%
Published-13 May, 2011 | 17:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.

Action-Not Available
Vendor-perln/a
Product-perln/a
CVE-2016-1246
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-1.93% / 83.52%
||
7 Day CHG~0.00%
Published-05 Oct, 2016 | 16:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.

Action-Not Available
Vendor-perldbd-mysql_projectn/aDebian GNU/Linux
Product-dbd-mysqlperldebian_linuxn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2015-8853
Matching Score-8
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-8
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-13.99% / 94.37%
||
7 Day CHG~0.00%
Published-25 May, 2016 | 15:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."

Action-Not Available
Vendor-perln/aFedora Project
Product-perlfedoran/a
CWE ID-CWE-20
Improper Input Validation
CVE-2009-3626
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-1.30% / 79.82%
||
7 Day CHG~0.00%
Published-29 Oct, 2009 | 14:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.

Action-Not Available
Vendor-perln/a
Product-perln/a
CVE-2020-12723
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.60%
||
7 Day CHG~0.00%
Published-05 Jun, 2020 | 14:20
Updated-04 Aug, 2024 | 12:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.

Action-Not Available
Vendor-perln/aNetApp, Inc.Oracle CorporationFedora ProjectopenSUSE
Product-communications_diameter_signaling_routersd-wan_edgecommunications_billing_and_revenue_managementcommunications_offline_mediation_controllertekelec_platform_distributionperlconfiguration_managercommunications_eagle_lnp_application_processoroncommand_workflow_automationcommunications_performance_intelligence_centerfedoracommunications_eagle_application_processorsnap_creator_frameworkcommunications_lsmsenterprise_manager_base_platformleapn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2012-1151
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-5||MEDIUM
EPSS-2.48% / 85.39%
||
7 Day CHG~0.00%
Published-09 Sep, 2012 | 21:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.

Action-Not Available
Vendor-perln/a
Product-perln/a
CWE ID-CWE-134
Use of Externally-Controlled Format String
Details not found