Larry Wall Perl vulnerabilities
12 known vulnerabilities affecting larry_wall/perl.
Total CVEs
12
CISA KEV
0
Public exploits
5
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH5MEDIUM2LOW4
Vulnerabilities
Page 1 of 1
CVE-2007-5116HIGHCVSS 7.5v5.8.0v5.8.1+9 more2007-11-07
CVE-2007-5116 [HIGH] CWE-119 CVE-2007-5116: Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Pe
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
nvd
CVE-2005-4278HIGHCVSS 7.2≤ 5.8.6v5.3+15 more2005-12-16
CVE-2005-4278 [HIGH] CVE-2005-4278: Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in th
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
nvd
CVE-2005-0155MEDIUMCVSS 4.6PoCv5.8.02005-05-02
CVE-2005-0155 [MEDIUM] CVE-2005-0155: The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local us
The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.
nvd
CVE-2005-0448LOWCVSS 1.2v5.8.0v5.8.1+2 more2005-05-02
CVE-2005-0448 [LOW] CVE-2005-0448: Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to cr
Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.
nvd
CVE-2004-0976LOWCVSS 2.1v5.6v5.6.1+3 more2005-02-09
CVE-2004-0976 [LOW] CVE-2004-0976: Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating sys
Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
nvd
CVE-2005-0156LOWCVSS 2.1PoCv5.8.0v5.8.1+8 more2005-02-07
CVE-2005-0156 [LOW] CVE-2005-0156: Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sper
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
nvd
CVE-2004-2286HIGHCVSS 7.5PoCv5.3v5.4+8 more2004-12-31
CVE-2004-2286 [HIGH] CVE-2004-2286: Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial
Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
nvd
CVE-2004-0452LOWCVSS 2.6v5.6.1v5.8.42004-12-21
CVE-2004-0452 [LOW] CVE-2004-0452: Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/wri
Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.
nvd
CVE-2004-0377CRITICALCVSS 10.0≤ 5.8.32004-05-04
CVE-2004-0377 [CRITICAL] CVE-2004-0377: Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Per
Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
nvd
CVE-2003-0900MEDIUMCVSS 5.0v5.8.12003-12-31
CVE-2003-0900 [MEDIUM] CVE-2003-0900: Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, whi
Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers.
nvd
CVE-2000-0703HIGHCVSS 7.2PoCv5.4.5v5.5+2 more2000-10-20
CVE-2000-0703 [HIGH] CVE-2000-0703: suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
nvd
CVE-1999-0034HIGHCVSS 7.2PoCv5.31997-05-29
CVE-1999-0034 [HIGH] CVE-1999-0034: Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
nvd