{"id":"CVE-2011-3597","details":"Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.","modified":"2025-08-09T19:01:27Z","published":"2012-01-13T18:55:03Z","references":[{"type":"ADVISORY","url":"http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc"},{"type":"ADVISORY","url":"http://secunia.com/advisories/46279"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51457"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:008"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:009"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1643-1"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=743010"},{"type":"WEB","url":"http://cpansearch.perl.org/src/GAAS/Digest-1.17/Changes"},{"type":"WEB","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"},{"type":"WEB","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2011-1424.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2011-1797.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/49911"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19446"}],"schema_version":"1.7.3"}