Vulnerabilities > Perl > Perl > 5.12.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-01-04 | CVE-2012-6329 | Code Injection vulnerability in Perl The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6. | 7.5 |
2012-12-21 | CVE-2011-2728 | Remote Code Execution vulnerability in Perl 'decode_xs()' and 'File::Glob::bsd_glob()' The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. network perl | 4.3 |
2012-12-18 | CVE-2012-5195 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Perl Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator. | 7.5 |
2011-04-11 | CVE-2011-1487 | Permissions, Privileges, and Access Controls vulnerability in Perl The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string. | 5.0 |