Page 6 of 80 results (0.003 seconds)

CVSS: 7.5EPSS: 5%CPEs: 3EXPL: 1

10 Feb 2014 — The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash. La función Perl_reg_numbered_buff_fetch en Perl 5.10.0, 5.12.0, 5.14.0 y otras versiones, cuando funciona con debugging ac... • https://www.exploit-db.com/exploits/35489 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 2%CPEs: 61EXPL: 0

09 Mar 2013 — The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key. El mecanismo de rehash en Perl v5.8.2 a través v5.16.x permite a atacantes dependientes de contexto provocar una denegación de servicio (consumo de memoria y caída) mediante una tecla de almohadilla diseñada. Perl is a high-level programming language commonly used for system administration utilities and web programming. A heap overflow flaw ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 141EXPL: 0

21 Dec 2012 — The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. La función bsd_glob en el módulo de archivo ::Glob para Perl antes de v5.14.2 permite a atacantes dependientes de contexto provocar una denegación de servicio (caída) a través de una expresión regular dada con la bandera GLOB_ALTDIRFUNC, lo que desencadena una des... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod •

CVSS: 10.0EPSS: 82%CPEs: 51EXPL: 5

15 Dec 2012 — The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6. La función _compile en ... • https://packetstorm.news/files/id/119055 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 2%CPEs: 23EXPL: 0

26 Oct 2012 — Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator. Desbordamiento de bufer en memoria dinámica en la función Perl_repeatcpy en util.c en Perl v5.12.x antes de v5.12.5, v5.14.x antes de v5.14.3, y v5.15.x antes de v5.15.5 permite a atacantes dependient... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

07 Oct 2012 — ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS. ProcessTable.pm en el módulo Proc::ProcessTable v0.45 para Perl, cuando el caché de información TTY está activado, permite a usuarios locales sobrescribir ficheros a través de un ataque de enlaces simbólicos en /tmp/TTYDEVS. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 9.8EPSS: 2%CPEs: 120EXPL: 0

11 Mar 2012 — Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function. Múltiples vulnerabilidades de formato de cadena en dbdimp.c en el módulo DBD::Pg (también conocido como DBD-Pg o libdbd-pg-perl) anteriores a c2.19.0 en ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 9.8EPSS: 2%CPEs: 176EXPL: 1

03 Nov 2011 — Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow. Error "Off-by-one" en la función decode_xs en Unicode/Unicode.xs en el módulo Encode anterior a v2.44, utilizado en Perl anterior a v5.15.6 , podría permitir a atacantes dependientes de contexto causar una denegación d... • http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod • CWE-122: Heap-based Buffer Overflow CWE-189: Numeric Errors •

CVSS: 9.1EPSS: 0%CPEs: 12EXPL: 0

10 Oct 2011 — The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack. El módulo Crypt::DSA (también conocido como Crypt-DSA) v1.17 y anterior para Perl, cuando /dev/random está ausente, usa el módulo Data::Random, lo que hace más fácil para atacantes remotos falsificar la firma, o determinar una clave de firma en un ... • http://osvdb.org/76025 • CWE-310: Cryptographic Issues •

CVSS: 9.1EPSS: 5%CPEs: 73EXPL: 8

14 Sep 2011 — The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input. El módulo Data::FormValidator v4.66 y anteriores para Perl, cuando untaint_all_constraints está activada, no conserva correctamente el atributo taint de los datos, lo que podría permitir a atacantes remotos evitar el mecanismo de protección ante corrupción de datos... • https://www.exploit-db.com/exploits/35836 • CWE-264: Permissions, Privileges, and Access Controls •