Lucene search

K
Larry WallPerl5.8.0

7 matches found

CVE
CVE
added 2005/05/02 4:0 a.m.127 views

CVE-2005-0155

The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.

4.6CVSS6AI score0.00372EPSS
CVE
CVE
added 2007/11/07 11:46 p.m.104 views

CVE-2007-5116

Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.

7.5CVSS9.8AI score0.11413EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.70 views

CVE-2005-0448

Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.

1.2CVSS5.8AI score0.0008EPSS
CVE
CVE
added 2005/02/07 5:0 a.m.64 views

CVE-2005-0156

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.

2.1CVSS7AI score0.00386EPSS
CVE
CVE
added 2005/02/09 5:0 a.m.57 views

CVE-2004-0976

Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.

2.1CVSS5.8AI score0.00081EPSS
CVE
CVE
added 2005/08/04 4:0 a.m.36 views

CVE-2004-2286

Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.

7.5CVSS8.1AI score0.06157EPSS
CVE
CVE
added 2005/12/16 11:3 a.m.35 views

CVE-2005-4278

Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.

7.2CVSS6.3AI score0.00075EPSS