Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2007-5116

Disclosure Date: November 07, 2007 (last updated October 04, 2023)
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
0
Attacker Value
Unknown

CVE-2005-4278

Disclosure Date: December 16, 2005 (last updated February 22, 2025)
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
0
Attacker Value
Unknown

CVE-2005-0448

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.
0
Attacker Value
Unknown

CVE-2005-0155

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.
0
Attacker Value
Unknown

CVE-2004-0976

Disclosure Date: February 09, 2005 (last updated February 22, 2025)
Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
0
Attacker Value
Unknown

CVE-2005-0156

Disclosure Date: February 07, 2005 (last updated February 22, 2025)
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
0
Attacker Value
Unknown

CVE-2004-2286

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
0
Attacker Value
Unknown

CVE-2004-0452

Disclosure Date: December 21, 2004 (last updated February 22, 2025)
Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.
0
Attacker Value
Unknown

CVE-2004-0377

Disclosure Date: May 04, 2004 (last updated February 22, 2025)
Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
0
Attacker Value
Unknown

CVE-2003-0900

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers.
0