
CVE-2013-1667 – perl: DoS in rehashing code
https://notcve.org/view.php?id=CVE-2013-1667
12 Mar 2013 — The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key. El mecanismo de rehash en Perl v5.8.2 a través v5.16.x permite a atacantes dependientes de contexto provocar una denegación de servicio (consumo de memoria y caída) mediante una tecla de almohadilla diseñada. Multiple vulnerabilities have been found in Perl and Locale::Maketext Perl module, the worst of which could allow a context-dependent ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296 • CWE-399: Resource Management Errors •

CVE-2012-6329 – Foswiki MAKETEXT - Remote Command Execution
https://notcve.org/view.php?id=CVE-2012-6329
04 Jan 2013 — The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6. La función _compile en ... • https://www.exploit-db.com/exploits/23580 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2011-2728 – Gentoo Linux Security Advisory 201401-11
https://notcve.org/view.php?id=CVE-2011-2728
21 Dec 2012 — The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. La función bsd_glob en el módulo de archivo ::Glob para Perl antes de v5.14.2 permite a atacantes dependientes de contexto provocar una denegación de servicio (caída) a través de una expresión regular dada con la bandera GLOB_ALTDIRFUNC, lo que desencadena una des... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod •

CVE-2012-5195 – perl: heap buffer overrun flaw may lead to arbitrary code execution
https://notcve.org/view.php?id=CVE-2012-5195
18 Dec 2012 — Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator. Desbordamiento de bufer en memoria dinámica en la función Perl_repeatcpy en util.c en Perl v5.12.x antes de v5.12.5, v5.14.x antes de v5.14.3, y v5.15.x antes de v5.15.5 permite a atacantes dependient... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2011-4363 – Mandriva Linux Security Advisory 2013-216
https://notcve.org/view.php?id=CVE-2011-4363
07 Oct 2012 — ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS. ProcessTable.pm en el módulo Proc::ProcessTable v0.45 para Perl, cuando el caché de información TTY está activado, permite a usuarios locales sobrescribir ficheros a través de un ataque de enlaces simbólicos en /tmp/TTYDEVS. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2012-1151 – perl-DBD-Pg: Format string flaws by turning db notices into Perl warnings and by preparing DBD statement
https://notcve.org/view.php?id=CVE-2012-1151
09 Sep 2012 — Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function. Múltiples vulnerabilidades de formato de cadena en dbdimp.c en el módulo DBD::Pg (también conocido como DBD-Pg o libdbd-pg-perl) anteriores a c2.19.0 en ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536 • CWE-134: Use of Externally-Controlled Format String •

CVE-2011-2939 – Perl decode_xs heap-based buffer overflow
https://notcve.org/view.php?id=CVE-2011-2939
13 Jan 2012 — Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow. Error "Off-by-one" en la función decode_xs en Unicode/Unicode.xs en el módulo Encode anterior a v2.44, utilizado en Perl anterior a v5.15.6 , podría permitir a atacantes dependientes de contexto causar una denegación d... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVE-2011-3599 – Mandriva Linux Security Advisory 2013-241
https://notcve.org/view.php?id=CVE-2011-3599
10 Oct 2011 — The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack. El módulo Crypt::DSA (también conocido como Crypt-DSA) v1.17 y anterior para Perl, cuando /dev/random está ausente, usa el módulo Data::Random, lo que hace más fácil para atacantes remotos falsificar la firma, o determinar una clave de firma en un ... • http://osvdb.org/76025 • CWE-310: Cryptographic Issues •

CVE-2011-2201 – Perl Data::FormValidator 4.66 Module - 'results()' Security Bypass
https://notcve.org/view.php?id=CVE-2011-2201
14 Sep 2011 — The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input. El módulo Data::FormValidator v4.66 y anteriores para Perl, cuando untaint_all_constraints está activada, no conserva correctamente el atributo taint de los datos, lo que podría permitir a atacantes remotos evitar el mecanismo de protección ante corrupción de datos... • https://www.exploit-db.com/exploits/35836 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2011-0761 – Perl 5.10 - Multiple Null Pointer Dereference Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2011-0761
13 May 2011 — Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call. Perl v5.10.x permite a atacantes dependientes de contexto provocar una denegación del servicio (desreferencia a un puntero NULL y bloqueo de la aplicación) elevando una habilidad para inyectar argumentos en una llamada ... • https://www.exploit-db.com/exploits/35725 •