Home
last modified time | relevance | path

Searched refs:CVE (Results 1 – 25 of 45) sorted by relevance

12

/openbsd-src/lib/libexpat/
H A DChanges35 #915 CVE-2024-50602 -- Fix crash within function XML_ResumeParser
47 #317 #918 tests: Improve tests on doctype closing (ex CVE-2019-15903)
66 #887 #890 CVE-2024-45490 -- Calling function XML_ParseBuffer with
75 #888 #891 CVE-2024-45491 -- Internal function dtdCopy can have an
80 #889 #892 CVE-2024-45492 -- Internal function nextScaffoldPart can
120 #839 #842 CVE-2024-28757 -- Prevent billion laughs attacks with
168 #789 #814 CVE-2023-52425 -- Fix quadratic runtime issues with big tokens
178 #777 CVE-2023-52426 -- Fix billion laughs attacks for users
181 Expat >=2.4.0 (and that was CVE-2013-0340 back then).
282 #616 #649 #650 CVE
[all...]
/openbsd-src/gnu/usr.bin/perl/pod/
H A Dperl5263delta.pod17 =head2 [CVE-2018-12015] Directory traversal in module Archive::Tar
26 =head2 [CVE-2018-18311] Integer overflow leading to buffer overflow and segmentation fault
35 =head2 [CVE-2018-18312] Heap-buffer-overflow write in S_regatom (regcomp.c)
42 =head2 [CVE-2018-18313] Heap-buffer-overflow read in S_grok_bslash_N (regcomp.c)
49 =head2 [CVE-2018-18314] Heap-buffer-overflow write in S_regatom (regcomp.c)
H A Dperl5244delta.pod17 =head2 [CVE-2018-6797] heap-buffer-overflow (WRITE of size 1) in S_regatom (regcomp.c)
23 =head2 [CVE-2018-6798] Heap-buffer-overflow in Perl__byte_dump_string (utf8.c)
29 =head2 [CVE-2018-6913] heap-buffer-overflow in S_pack_rec
H A Dperl5283delta.pod17 =head2 [CVE-2020-10543] Buffer overflow caused by a crafted regular expression
30 =head2 [CVE-2020-10878] Integer overflow via malformed bytecode produced by a crafted regular expre…
39 =head2 [CVE-2020-12723] Buffer overflow caused by a crafted regular expression
H A Dperl5303delta.pod17 =head2 [CVE-2020-10543] Buffer overflow caused by a crafted regular expression
30 =head2 [CVE-2020-10878] Integer overflow via malformed bytecode produced by a crafted regular expre…
39 =head2 [CVE-2020-12723] Buffer overflow caused by a crafted regular expression
H A Dperldelta.pod
H A Dperl5362delta.pod19 =head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property
28 =head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability
H A Dperl5342delta.pod19 =head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property
28 =head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability
H A Dperl5363delta.pod20 =head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property
29 =head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability
H A Dperl5381delta.pod19 =head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property
28 =head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability
H A Dperl5343delta.pod20 =head2 CVE-2023-47038 - Write past buffer end via illegal user-defined Unicode property
29 =head2 CVE-2023-47039 - Perl for Windows binary hijacking vulnerability
H A Dperlsecpolicy.pod4 CVE perlsecpolicy SV perl Perl SDBM HackerOne Mitre
350 =head3 CVE ID assignment
353 the security team will request a CVE identifier for the issue to use
358 the CVE ID request.
365 Once a CVE ID has been assigned, you will be notified by email.
443 information, fixes, and CVE IDs are visible to affected users as rapidly as
454 request a CVE ID and send an announcement to inform users.
H A Dperl5281delta.pod17 =head2 [CVE-2018-18311] Integer overflow leading to buffer overflow and segmentation fault
26 =head2 [CVE-2018-18312] Heap-buffer-overflow write in S_regatom (regcomp.c)
H A Dperl5261delta.pod17 =head2 [CVE-2017-12837] Heap buffer overflow in regular expression compiler
24 =head2 [CVE-2017-12883] Buffer over-read in regular expression parser
31 =head2 [CVE-2017-12814] C<$ENV{$key}> stack buffer overflow on Windows
H A Dperl5125delta.pod18 =head2 C<Encode> decode_xs n-byte heap-overflow (CVE-2011-2939)
23 =head2 C<File::Glob::bsd_glob()> memory error with GLOB_ALTDIRFUNC (CVE-2011-2728)
32 =head2 Heap buffer overrun in 'x' string repeat operator (CVE-2012-5195)
H A Dperl5262delta.pod17 =head2 [CVE-2018-6797] heap-buffer-overflow (WRITE of size 1) in S_regatom (regcomp.c)
23 =head2 [CVE-2018-6798] Heap-buffer-overflow in Perl__byte_dump_string (utf8.c)
29 =head2 [CVE-2018-6913] heap-buffer-overflow in S_pack_rec
H A Dperl5243delta.pod17 =head2 [CVE-2017-12837] Heap buffer overflow in regular expression compiler
24 =head2 [CVE-2017-12883] Buffer over-read in regular expression parser
31 =head2 [CVE-2017-12814] C<$ENV{$key}> stack buffer overflow on Windows
H A Dperl5142delta.pod22 =head2 C<File::Glob::bsd_glob()> memory error with GLOB_ALTDIRFUNC (CVE-2011-2728)
31 =head2 C<Encode> decode_xs n-byte heap-overflow (CVE-2011-2939)
H A Dperl5222delta.pod19 This is CVE-2015-8608. For more information see
24 This is CVE-2015-8607. For more information see
59 This is CVE-2016-2381.
H A Dperl5143delta.pod22 =head2 C<Digest> unsafe use of eval (CVE-2011-3597)
33 =head2 Heap buffer overrun in 'x' string repeat operator (CVE-2012-5195)
H A Dperl5163delta.pod26 =head2 CVE-2013-1667: memory exhaustion with arbitrary hash keys
/openbsd-src/gnu/usr.bin/perl/dist/Storable/
H A DMANIFEST25 t/CVE-2015-1592.t
/openbsd-src/gnu/usr.bin/perl/Porting/
H A Dsecurity_template.pod21 Ideally, FIXME here should be the CVE-ID as a link to cve.mitre.org
/openbsd-src/gnu/usr.bin/perl/cpan/Config-Perl-V/t/
H A D25_plv5162.t170 CVE-2013-1667 hashtable DOS fix
/openbsd-src/gnu/usr.bin/perl/dist/Data-Dumper/
H A DChanges152 - Most notably, this release fixes CVE-2014-4330:
157 This patch addresses CVE-2014-4330. This bug was found and

12