Page 3 of 27 results (0.015 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

10 Feb 2014 — The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash. La función Perl_reg_numbered_buff_fetch en Perl 5.10.0, 5.12.0, 5.14.0 y otras versiones, cuando funciona con debugging ac... • https://www.exploit-db.com/exploits/35489 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 1%CPEs: 61EXPL: 0

12 Mar 2013 — The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key. El mecanismo de rehash en Perl v5.8.2 a través v5.16.x permite a atacantes dependientes de contexto provocar una denegación de servicio (consumo de memoria y caída) mediante una tecla de almohadilla diseñada. Multiple vulnerabilities have been found in Perl and Locale::Maketext Perl module, the worst of which could allow a context-dependent ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296 • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 58%CPEs: 51EXPL: 2

04 Jan 2013 — The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6. La función _compile en ... • https://www.exploit-db.com/exploits/23580 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 141EXPL: 0

21 Dec 2012 — The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. La función bsd_glob en el módulo de archivo ::Glob para Perl antes de v5.14.2 permite a atacantes dependientes de contexto provocar una denegación de servicio (caída) a través de una expresión regular dada con la bandera GLOB_ALTDIRFUNC, lo que desencadena una des... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod •

CVSS: 10.0EPSS: 1%CPEs: 23EXPL: 0

18 Dec 2012 — Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator. Desbordamiento de bufer en memoria dinámica en la función Perl_repeatcpy en util.c en Perl v5.12.x antes de v5.12.5, v5.14.x antes de v5.14.3, y v5.15.x antes de v5.15.5 permite a atacantes dependient... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 2%CPEs: 176EXPL: 1

13 Jan 2012 — Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow. Error "Off-by-one" en la función decode_xs en Unicode/Unicode.xs en el módulo Encode anterior a v2.44, utilizado en Perl anterior a v5.15.6 , podría permitir a atacantes dependientes de contexto causar una denegación d... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 9.8EPSS: 1%CPEs: 40EXPL: 6

11 Apr 2011 — The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string. Las funciones (1) lc, (2) lcfirst, (3) uc, y (4) ucfirst en Perl v5.10.x, v5.11.x, y v5.12.x hasta v5.12.3, y v5.13.x hasta v5.13.11, no aplica el atributo taint para devolver el va... • https://www.exploit-db.com/exploits/35554 • CWE-264: Permissions, Privileges, and Access Controls •