perl5 vulnerabilities

Licenses: GPL-1.0 | Unknown

Direct Vulnerabilities

Known vulnerabilities in the https://cpan.org|perl5 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Heap-based Buffer Overflow

[,5.38.4-RC1)[5.39.0,5.40.2-RC1)
  • H
Improper Certificate Validation

[,5.38.0-RC1)
  • M
Access Restriction Bypass

[0,)
  • H
Out-of-bounds Write

[,5.28.3)[5.30.0,5.30.3)
  • C
Out-of-bounds Write

[,5.26.3)[5.28.0,5.28.1)
  • H
Resource Management Errors

[5.8.2,5.16.2]
  • M
Denial of Service (DoS)

[5.8.6,5.9.2]
  • H
CVE-2005-4278

[,5.8.7)
  • M
Arbitrary Code Execution

[5.8.0,5.8.4.5]
  • M
Resource Management Errors

[,5.8.8]
  • H
Denial of Service (DoS)

[0,5.19.5)
  • M
Denial of Service (DoS)

[5.8.1,5.8.9]
  • H
Improper Input Validation

[,5.23.9)
  • H
Out-of-Bounds

[,5.12.5)[5.14.0,5.14.3)[15.15.0,15.15.5)
  • M
CVE-2004-0976

[5.6,5.8.3]
  • L
CVE-2005-0448

[,5.8.4)
  • M
Arbitrary Code Execution

[5.6.1,5.8.4]
  • M
Improper Input Validation

[5.10,5.14.0]
  • H
Out-of-Bounds

[,5.24.3)
  • H
Arbitrary Code Execution

[5.23.0,5.24.1)[5.25.0,5.25.3)
  • H
Symlink Attack

[,5.26.3)
  • C
Out-of-Bounds

[,5.24.3)[5.26,5.26.1)
  • H
Integer Overflow or Wraparound

[,5.30.3)
  • M
Arbitrary Code Execution

[,5.8.0]
  • C
Out-of-Bounds

[,5.24.3)
  • C
Out-of-Bounds

[,5.26.3)[5.28.0,5.28.1)
  • H
Out-of-Bounds

[5.8.0,5.8.6]
  • M
Access Restriction Bypass

[5.10.0,5.13.11]
  • H
Buffer Overflow

[,5.30.3)
  • H
Denial of Service (DoS)

[5.3,5.8.3]
  • C
Out-of-bounds Read

[,5.26.3)
  • M
Denial of Service (DoS)

[,5.14.2)
  • M
Denial of Service (DoS)

[,5.14.3)
  • H
Improper Input Validation

[5.4.5,5.6]
  • M
CVE-2003-0900

[,5.8.1]
  • H
Access Restriction Bypass

[,5.22.3)[5.24.0,5.24.1)
  • H
Out-of-bounds Read

[5.22,5.26.2)
  • M
Out-of-Bounds

[,5.21.10)
  • H
Remote Code Execution (RCE)

[,5.17.7)
  • M
Access Restriction Bypass

[0,5.10.0-27.fc9)
  • C
Out-of-bounds Read

[0,5.24.0)
  • C
Out-of-bounds Write

[,5.26.2)
  • M
Denial of Service (DoS)

[,5.10.1]
  • C
Out-of-Bounds

[,5.26.3)
  • C
Out-of-bounds Write

[,5.26.2)
  • H
Improper Input Validation

[,5.24.0)
  • M
Denial of Service (DoS)

[5.10.1,5.12.0)