Direct Vulnerabilities

Known vulnerabilities in the perl package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2017-20230

<5.28.0-3
  • L
CVE-2026-4176

<5.10.0-21
  • L
CVE-2025-40909

<5.40.1-5
  • C
Out-of-bounds Write

<5.26.1-6
  • H
Link Following

<5.26.2-6
  • C
Out-of-Bounds

<5.28.1-1
  • M
Directory Traversal

<5.10.0-19
  • L
Out-of-bounds Write

<5.36.0-4
  • M
CVE-2003-0900

<5.8.2
  • L
Out-of-bounds Write

<5.40.1-3
  • H
Resource Management Errors

<5.14.2-19
  • C
Out-of-bounds Read

<5.28.0-3
  • H
Out-of-Bounds

<5.26.0-8
  • M
Race Condition

<5.24.1-3
  • H
Buffer Overflow

<5.30.3-1
  • L
Improper Certificate Validation

<5.38.2-2
  • M
Out-of-Bounds

<5.20.1-1
  • C
Out-of-bounds Write

<5.28.1-1
  • L
Improper Input Validation

<5.12.4-6
  • H
Improper Input Validation

<5.22.1-8
  • L
CVE-2011-0761

<5.12.0-1
  • M
Access Restriction Bypass

<5.10.0-11
  • H
Race Condition

<5.10.0-18
  • L
Numeric Errors

<5.10.0-23
  • H
Untrusted Search Path

<5.32.1-5
  • M
CVE-2005-0155

<5.8.4-6
  • M
CVE-2005-0156

<5.8.4-6
  • L
CVE-2011-2728

<5.14.2-1
  • M
CVE-2004-0452

<5.8.4-5
  • M
CVE-2002-1323

<5.8.0-14
  • L
CVE-2005-0448

<5.8.4-7
  • M
CVE-2003-0615

<5.8.0-19
  • M
CVE-2009-3626

<5.10.1-6
  • L
Improper Input Validation

<5.20.1-1
  • H
Improper Certificate Validation

<5.38.2-2
  • H
Integer Overflow or Wraparound

<5.30.3-1
  • C
Arbitrary Code Injection

<5.18.1-2
  • H
Arbitrary Code Injection

<5.14.2-16
  • H
Improper Input Validation

<5.22.1-4
  • H
Numeric Errors

<5.20.0-1
  • M
Arbitrary Code Injection

<5.10.1-17
  • M
Arbitrary Code Injection

<5.10.1-17
  • M
CVE-2004-0976

<5.8.4-4
  • M
Numeric Errors

<5.8.7-9
  • C
Out-of-Bounds

<5.28.0-3
  • H
Improper Verification of Cryptographic Signature

<5.36.0-4
  • M
Configuration

<5.14.2-16
  • M
CVE-2010-4411

<5.10.1-17
  • H
Improper Input Validation

<5.22.1-1
  • H
Access Restriction Bypass

<5.12.3-1
  • H
Out-of-bounds Read

<5.26.1-6
  • H
Out-of-Bounds

<5.14.2-14
  • M
CVE-2003-0618

<5.8.3-3
  • M
Resource Management Errors

<5.10.0-1
  • C
Out-of-bounds Write

<5.26.1-6
  • C
Out-of-Bounds

<5.26.0-8
  • H
Out-of-bounds Write

<5.30.3-1
  • H
CVE-2016-6185

<5.22.2-2
  • H
Access Restriction Bypass

<5.22.2-3
  • L
Access Restriction Bypass

<5.10.1-20
  • H
Out-of-bounds Write

<5.36.0-10
  • H
Race Condition

<5.10.0-18
  • L
Link Following

*
  • M
Out-of-Bounds

<5.8.8-12
  • H
CVE-2002-0703

<5.8.0-7
  • L
Numeric Errors

<5.12.4-4
  • H
Access Restriction Bypass

<5.10.1-13