CyberCodex logo
  • Home
  • Blog
  • Services
    • Tools
    • CVE
    • Yara
      • Search Yara rules
      • Query Builder
  • About us
    • About us
    • Contact
  • Home
  • Blog
  • Tools
  • CVE
  • About us
  • Contact
  • Home
  • CVE-2020-10543

CVE-2020-10543

Published at:
2020-06-05T14:15:10.467
Source: [email protected]

Global infos:

Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.

CVE Status: Modified

References:

  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityLOW
    Attack VectorNETWORK
    Availability ImpactHIGH
    Base Score8.2
    Base SeverityHIGH
    Confidentiality ImpactNONE
    Integrity ImpactLOW
    Privileges RequiredNONE
    ScopeUNCHANGED
    User InteractionNONE
    Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
    Exploitability Score3.9
    Impact Score4.2
    Source[email protected]
    TypePrimary

    Links:

    Exploit-db
    Github

    Most recherched CVEs
    • CVE-2021-44228
    • CVE-2022-30190
    • CVE-2022-22965
    • CVE-2021-26855
    Popular Keywords
    • JavaScript
    • Log4j
    • Buffer Overflow
    • Remote Code Execution (RCE)
    • SQL Injection
    • Cross-Site Scripting (XSS)
    • Privilege Escalation
    • Insecure Deserialization
    • Supply Chain Attack
    image
    Our content
    • Hack In The Shell
    • Personal Portfolio
    Resource
    • Submit Subject
    • Partners
    • Discover
    Account
    • Our team
    • Join Us
    CyberCodex
    • Help center
    • Platform status
    Join the community

    © CyberCodex | Sn0wAlice Fundation - Made With ❤️

    • Privacy Policy
    • Terms and Conditions