
CVE-2012-6329 – TWiki MAKETEXT Remote Command Execution
https://notcve.org/view.php?id=CVE-2012-6329
15 Dec 2012 — The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6. La función _compile en ... • https://packetstorm.news/files/id/119055 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2012-5195 – perl: heap buffer overrun flaw may lead to arbitrary code execution
https://notcve.org/view.php?id=CVE-2012-5195
26 Oct 2012 — Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator. Desbordamiento de bufer en memoria dinámica en la función Perl_repeatcpy en util.c en Perl v5.12.x antes de v5.12.5, v5.14.x antes de v5.14.3, y v5.15.x antes de v5.15.5 permite a atacantes dependient... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2011-4363 – Mandriva Linux Security Advisory 2013-216
https://notcve.org/view.php?id=CVE-2011-4363
07 Oct 2012 — ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS. ProcessTable.pm en el módulo Proc::ProcessTable v0.45 para Perl, cuando el caché de información TTY está activado, permite a usuarios locales sobrescribir ficheros a través de un ataque de enlaces simbólicos en /tmp/TTYDEVS. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2012-1151 – perl-DBD-Pg: Format string flaws by turning db notices into Perl warnings and by preparing DBD statement
https://notcve.org/view.php?id=CVE-2012-1151
11 Mar 2012 — Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function. Múltiples vulnerabilidades de formato de cadena en dbdimp.c en el módulo DBD::Pg (también conocido como DBD-Pg o libdbd-pg-perl) anteriores a c2.19.0 en ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536 • CWE-134: Use of Externally-Controlled Format String •

CVE-2011-2939 – Perl decode_xs heap-based buffer overflow
https://notcve.org/view.php?id=CVE-2011-2939
03 Nov 2011 — Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow. Error "Off-by-one" en la función decode_xs en Unicode/Unicode.xs en el módulo Encode anterior a v2.44, utilizado en Perl anterior a v5.15.6 , podría permitir a atacantes dependientes de contexto causar una denegación d... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVE-2011-3599 – Mandriva Linux Security Advisory 2013-241
https://notcve.org/view.php?id=CVE-2011-3599
10 Oct 2011 — The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack. El módulo Crypt::DSA (también conocido como Crypt-DSA) v1.17 y anterior para Perl, cuando /dev/random está ausente, usa el módulo Data::Random, lo que hace más fácil para atacantes remotos falsificar la firma, o determinar una clave de firma en un ... • http://osvdb.org/76025 • CWE-310: Cryptographic Issues •

CVE-2011-2201 – Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass
https://notcve.org/view.php?id=CVE-2011-2201
14 Sep 2011 — The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input. El módulo Data::FormValidator v4.66 y anteriores para Perl, cuando untaint_all_constraints está activada, no conserva correctamente el atributo taint de los datos, lo que podría permitir a atacantes remotos evitar el mecanismo de protección ante corrupción de datos... • https://www.exploit-db.com/exploits/35836 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2011-0761 – Perl 5.10 - Multiple Null Pointer Dereference Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2011-0761
09 May 2011 — Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call. Perl v5.10.x permite a atacantes dependientes de contexto provocar una denegación del servicio (desreferencia a un puntero NULL y bloqueo de la aplicación) elevando una habilidad para inyectar argumentos en una llamada ... • https://www.exploit-db.com/exploits/35725 •

CVE-2011-1487 – Perl 5.x - 'lc()' / 'uc()' TAINT Mode Protection Security Bypass
https://notcve.org/view.php?id=CVE-2011-1487
11 Apr 2011 — The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string. Las funciones (1) lc, (2) lcfirst, (3) uc, y (4) ucfirst en Perl v5.10.x, v5.11.x, y v5.12.x hasta v5.12.3, y v5.13.x hasta v5.13.11, no aplica el atributo taint para devolver el va... • https://www.exploit-db.com/exploits/35554 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-1168 – Safe: Intended restriction bypass via object references
https://notcve.org/view.php?id=CVE-2010-1168
12 Jun 2010 — The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods." El módulo Safe (Safe.pm) en versiones anteriores a la v2.25 de Perl permite a atacantes, dependiendo del contexto, evitar las restricciones ... • http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-security-hole.html • CWE-264: Permissions, Privileges, and Access Controls •