Search for vulnerabilities
Vulnerability details: VCID-geqs-zd7s-aaaf
Vulnerability ID VCID-geqs-zd7s-aaaf
Aliases CVE-2011-2728
Summary The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00563 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00604 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00680 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00947 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00947 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00947 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.00947 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
epss 0.01186 https://api.first.org/data/v1/epss?cve=CVE-2011-2728
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=742236
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2011-2728
Reference id Reference type URL
http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod
http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html
http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2728.json
https://api.first.org/data/v1/epss?cve=CVE-2011-2728
https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1
https://bugzilla.redhat.com/show_bug.cgi?id=742987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2728
http://secunia.com/advisories/46172
http://www.securityfocus.com/bid/49858
742236 https://bugzilla.redhat.com/show_bug.cgi?id=742236
cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.18.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.18.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*
CVE-2011-2728 https://nvd.nist.gov/vuln/detail/CVE-2011-2728
GLSA-201401-11 https://security.gentoo.org/glsa/201401-11
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2011-2728
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.65732
EPSS Score 0.00563
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.