Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2013-1667 |
The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key. Published: March 13, 2013; 11:13:36 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2012-6329 |
The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6. Published: January 04, 2013; 4:55:01 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2011-2728 |
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. Published: December 21, 2012; 12:46:14 AM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2011-2939 |
Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow. Published: January 13, 2012; 1:55:02 PM -0500 |
V3.x:(not available) V2.0: 5.1 MEDIUM |
CVE-2011-1487 |
The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string. Published: April 11, 2011; 2:55:03 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |