Search for vulnerabilities
Vulnerability details: VCID-ve5u-hpat-aaad
Vulnerability ID VCID-ve5u-hpat-aaad
Aliases CVE-2013-1667
Summary The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2013:0685
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01884 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01884 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01884 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.01884 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03053 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.03392 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
epss 0.08619 https://api.first.org/data/v1/epss?cve=CVE-2013-1667
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2013-1667
Reference id Reference type URL
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://marc.info/?l=bugtraq&m=137891988921058&w=2
http://osvdb.org/90892
http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5
http://perl5.git.perl.org/perl.git/commitdiff/9d83adc
http://perl5.git.perl.org/perl.git/commitdiff/d59e31f
http://rhn.redhat.com/errata/RHSA-2013-0685.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1667.json
https://api.first.org/data/v1/epss?cve=CVE-2013-1667
https://bugzilla.redhat.com/show_bug.cgi?id=912276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667
http://secunia.com/advisories/52472
http://secunia.com/advisories/52499
https://exchange.xforce.ibmcloud.com/vulnerabilities/82598
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094
http://www.debian.org/security/2013/dsa-2641
http://www.mandriva.com/security/advisories?name=MDVSA-2013:113
http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/58311
http://www.ubuntu.com/usn/USN-1770-1
702296 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296
cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.12.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.14.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.0:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.1:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.16.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.16.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*
cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*
CVE-2013-1667 https://nvd.nist.gov/vuln/detail/CVE-2013-1667
GLSA-201401-11 https://security.gentoo.org/glsa/201401-11
RHSA-2013:0685 https://access.redhat.com/errata/RHSA-2013:0685
USN-1770-1 https://usn.ubuntu.com/1770-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-1667
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.88677
EPSS Score 0.01842
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.