CVE-2010-1158

Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string. (CVSS:5.0) (Last Update:2013-10-23)

Id it was time for them all to go


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
</head>
<body bgcolor="#ffffff" text="#000000">
Any way w <img src="cid:1346be5e05ed21d309cf2020100416200111"> ith an electronic work
by people who agree to be bound by the terms of this agreement. There are a few things that
you can do with most Project Gutenberg-tm electronic works even without complying with the
full terms of this agreement.<br />
See paragraph 1.C below. There are a lot of things you can do with Project Gutenberg-tm electronic<br
/>
works if you follow the terms of this agreement and help preserve free future access to Project
Gutenberg-tm<br />
electronic works. See paragraph 1.E<br />
below. 1.C. The Project Gutenberg Literary Archive Foundation ("the Foundation" or PGLAF),
owns a compilation copyright in the<br />
collection of Project Gutenberg-tm electronic works. Nearly<br />
all the individual works in the collection are in 
</body>
</html>