Filtered by vendor Larry Wall
Subscriptions
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2007-5116 | 6 Debian, Larry Wall, Mandrakesoft and 3 more | 12 Debian Linux, Perl, Mandrake Linux and 9 more | 2024-11-21 | N/A |
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression. | ||||
CVE-2005-4278 | 1 Larry Wall | 1 Perl | 2024-11-21 | N/A |
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH. | ||||
CVE-2005-0448 | 2 Larry Wall, Redhat | 2 Perl, Enterprise Linux | 2024-11-21 | N/A |
Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452. | ||||
CVE-2005-0156 | 7 Ibm, Larry Wall, Redhat and 4 more | 9 Aix, Perl, Enterprise Linux and 6 more | 2024-11-21 | N/A |
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree. | ||||
CVE-2005-0155 | 2 Larry Wall, Redhat | 2 Perl, Enterprise Linux | 2024-11-21 | N/A |
The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable. | ||||
CVE-2004-2286 | 2 Activestate, Larry Wall | 2 Activeperl, Perl | 2024-11-21 | N/A |
Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow. | ||||
CVE-2004-0976 | 2 Larry Wall, Redhat | 2 Perl, Enterprise Linux | 2024-11-21 | N/A |
Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files. | ||||
CVE-2004-0452 | 2 Larry Wall, Redhat | 2 Perl, Enterprise Linux | 2024-11-21 | N/A |
Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. | ||||
CVE-2004-0377 | 2 Activestate, Larry Wall | 2 Activeperl, Perl | 2024-11-21 | N/A |
Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character. | ||||
CVE-2003-0900 | 1 Larry Wall | 1 Perl | 2024-11-21 | N/A |
Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers. | ||||
CVE-2000-0703 | 1 Larry Wall | 1 Perl | 2024-11-21 | N/A |
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence. | ||||
CVE-1999-0034 | 4 Bsdi, Larry Wall, Redhat and 1 more | 4 Bsd Os, Perl, Linux and 1 more | 2024-11-21 | N/A |
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. |
Page 1 of 1.