Searched refs:CVE (Results 1 – 25 of 45) sorted by relevance
12
35 #915 CVE-2024-50602 -- Fix crash within function XML_ResumeParser47 #317 #918 tests: Improve tests on doctype closing (ex CVE-2019-15903)66 #887 #890 CVE-2024-45490 -- Calling function XML_ParseBuffer with75 #888 #891 CVE-2024-45491 -- Internal function dtdCopy can have an80 #889 #892 CVE-2024-45492 -- Internal function nextScaffoldPart can120 #839 #842 CVE-2024-28757 -- Prevent billion laughs attacks with168 #789 #814 CVE-2023-52425 -- Fix quadratic runtime issues with big tokens178 #777 CVE-2023-52426 -- Fix billion laughs attacks for users181 Expat >=2.4.0 (and that was CVE-2013-0340 back then).282 #616 #649 #650 CVE[all...]
17 =head2 [CVE-2018-12015] Directory traversal in module Archive::Tar26 =head2 [CVE-2018-18311] Integer overflow leading to buffer overflow and segmentation fault35 =head2 [CVE-2018-18312] Heap-buffer-overflow write in S_regatom (regcomp.c)42 =head2 [CVE-2018-18313] Heap-buffer-overflow read in S_grok_bslash_N (regcomp.c)49 =head2 [CVE-2018-18314] Heap-buffer-overflow write in S_regatom (regcomp.c)
17 =head2 [CVE-2018-6797] heap-buffer-overflow (WRITE of size 1) in S_regatom (regcomp.c)23 =head2 [CVE-2018-6798] Heap-buffer-overflow in Perl__byte_dump_string (utf8.c)29 =head2 [CVE-2018-6913] heap-buffer-overflow in S_pack_rec
17 =head2 [CVE-2020-10543] Buffer overflow caused by a crafted regular expression30 =head2 [CVE-2020-10878] Integer overflow via malformed bytecode produced by a crafted regular expre…39 =head2 [CVE-2020-12723] Buffer overflow caused by a crafted regular expression
19 =head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property28 =head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability
20 =head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property29 =head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability
4 CVE perlsecpolicy SV perl Perl SDBM HackerOne Mitre350 =head3 CVE ID assignment353 the security team will request a CVE identifier for the issue to use358 the CVE ID request.365 Once a CVE ID has been assigned, you will be notified by email.443 information, fixes, and CVE IDs are visible to affected users as rapidly as454 request a CVE ID and send an announcement to inform users.
17 =head2 [CVE-2018-18311] Integer overflow leading to buffer overflow and segmentation fault26 =head2 [CVE-2018-18312] Heap-buffer-overflow write in S_regatom (regcomp.c)
17 =head2 [CVE-2017-12837] Heap buffer overflow in regular expression compiler24 =head2 [CVE-2017-12883] Buffer over-read in regular expression parser31 =head2 [CVE-2017-12814] C<$ENV{$key}> stack buffer overflow on Windows
18 =head2 C<Encode> decode_xs n-byte heap-overflow (CVE-2011-2939)23 =head2 C<File::Glob::bsd_glob()> memory error with GLOB_ALTDIRFUNC (CVE-2011-2728)32 =head2 Heap buffer overrun in 'x' string repeat operator (CVE-2012-5195)
22 =head2 C<File::Glob::bsd_glob()> memory error with GLOB_ALTDIRFUNC (CVE-2011-2728)31 =head2 C<Encode> decode_xs n-byte heap-overflow (CVE-2011-2939)
19 This is CVE-2015-8608. For more information see24 This is CVE-2015-8607. For more information see59 This is CVE-2016-2381.
22 =head2 C<Digest> unsafe use of eval (CVE-2011-3597)33 =head2 Heap buffer overrun in 'x' string repeat operator (CVE-2012-5195)
26 =head2 CVE-2013-1667: memory exhaustion with arbitrary hash keys
25 t/CVE-2015-1592.t
21 Ideally, FIXME here should be the CVE-ID as a link to cve.mitre.org
170 CVE-2013-1667 hashtable DOS fix
152 - Most notably, this release fixes CVE-2014-4330:157 This patch addresses CVE-2014-4330. This bug was found and