perl5 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://cpan.org|perl5 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Heap-based Buffer Overflow

[,5.38.4-RC1)[5.39.0,5.40.2-RC1)
  • H
Improper Certificate Validation

[,5.38.0-RC1)
  • C
Improper Check for Unusual or Exceptional Conditions

[5.30.0,5.34.2)[5.35.0,5.36.2)[5.37.0,5.38.1)
  • M
Access Restriction Bypass

[0,)
  • H
Out-of-bounds Write

[,5.28.3)[5.30.0,5.30.3)
  • C
Out-of-bounds Write

[,5.26.3)[5.28.0,5.28.1)
  • H
Resource Management Errors

[5.8.2,5.16.2]
  • M
Denial of Service (DoS)

[5.8.6,5.9.2]
  • H
CVE-2005-4278

[,5.8.7)
  • M
Arbitrary Code Execution

[5.8.0,5.8.4.5]
  • M
Resource Management Errors

[,5.8.8]
  • H
Denial of Service (DoS)

[0,5.19.5)
  • M
Denial of Service (DoS)

[5.8.1,5.8.9]
  • H
Improper Input Validation

[,5.23.9)
  • H
Out-of-Bounds

[,5.12.5)[5.14.0,5.14.3)[15.15.0,15.15.5)
  • M
CVE-2004-0976

[5.6,5.8.3]
  • L
CVE-2005-0448

[,5.8.4)
  • M
Arbitrary Code Execution

[5.6.1,5.8.4]
  • M
Improper Input Validation

[5.10,5.14.0]
  • H
Arbitrary Code Execution

[5.23.0,5.24.1)[5.25.0,5.25.3)
  • H
Out-of-Bounds

[,5.24.3)
  • C
Out-of-Bounds

[,5.24.3)[5.26,5.26.1)
  • H
Symlink Attack

[,5.26.3)
  • H
Integer Overflow or Wraparound

[,5.30.3)
  • M
Arbitrary Code Execution

[,5.8.0]
  • C
Out-of-Bounds

[,5.24.3)
  • C
Out-of-Bounds

[,5.26.3)[5.28.0,5.28.1)
  • H
Out-of-Bounds

[5.8.0,5.8.6]
  • M
Access Restriction Bypass

[5.10.0,5.13.11]
  • H
Buffer Overflow

[,5.30.3)
  • H
Denial of Service (DoS)

[5.3,5.8.3]
  • C
Out-of-bounds Read

[,5.26.3)
  • M
Denial of Service (DoS)

[,5.14.2)
  • M
Denial of Service (DoS)

[,5.14.3)
  • H
Improper Input Validation

[5.4.5,5.6]
  • M
CVE-2003-0900

[,5.8.1]
  • H
Access Restriction Bypass

[,5.22.3)[5.24.0,5.24.1)
  • H
Out-of-bounds Read

[5.22,5.26.2)
  • M
Out-of-Bounds

[,5.21.10)
  • H
Remote Code Execution (RCE)

[,5.17.7)
  • M
Access Restriction Bypass

[0,5.10.0-27.fc9)
  • C
Out-of-bounds Read

[0,5.24.0)
  • C
Out-of-bounds Write

[,5.26.2)
  • M
Denial of Service (DoS)

[,5.10.1]
  • C
Out-of-Bounds

[,5.26.3)
  • H
Improper Input Validation

[,5.24.0)
  • M
Denial of Service (DoS)

[5.10.1,5.12.0)
  • C
Out-of-bounds Write

[,5.26.2)