![](/assets/img/cve_300x82_sin_bg.png)
CVE-2012-6329 – Foswiki MAKETEXT - Remote Command Execution
https://notcve.org/view.php?id=CVE-2012-6329
04 Jan 2013 — The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6. La función _compile en ... • https://www.exploit-db.com/exploits/23580 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-2728 – Gentoo Linux Security Advisory 201401-11
https://notcve.org/view.php?id=CVE-2011-2728
21 Dec 2012 — The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. La función bsd_glob en el módulo de archivo ::Glob para Perl antes de v5.14.2 permite a atacantes dependientes de contexto provocar una denegación de servicio (caída) a través de una expresión regular dada con la bandera GLOB_ALTDIRFUNC, lo que desencadena una des... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-2939 – Perl decode_xs heap-based buffer overflow
https://notcve.org/view.php?id=CVE-2011-2939
13 Jan 2012 — Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow. Error "Off-by-one" en la función decode_xs en Unicode/Unicode.xs en el módulo Encode anterior a v2.44, utilizado en Perl anterior a v5.15.6 , podría permitir a atacantes dependientes de contexto causar una denegación d... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-4278
https://notcve.org/view.php?id=CVE-2005-4278
16 Dec 2005 — Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH. • http://secunia.com/advisories/17232 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-2286 – ActivePerl 5.x / Larry Wall Perl 5.x - Duplication Operator Integer Overflow
https://notcve.org/view.php?id=CVE-2004-2286
31 Dec 2004 — Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow. • https://www.exploit-db.com/exploits/24130 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0377
https://notcve.org/view.php?id=CVE-2004-0377
06 Apr 2004 — Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character. Desbordamiento de búfer en la función win32_stat de ActivePerl de ActiveState, y Perl de Larry Wall anterior a 5.8.3 permite a atacantes remotos ejecutar comandos arbitrarios mediante nombres de fichero que terminan en un carácter "" (barra invertida). • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0703 – SUIDPerl 5.00503 - Mail Shell Escape
https://notcve.org/view.php?id=CVE-2000-0703
13 Oct 2000 — suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence. • https://www.exploit-db.com/exploits/20141 •