Vulnerabilities > Larry Wall > Perl > 5.5.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-12-16 | CVE-2005-4278 | Packages Insecure RUNPATH vulnerability in Gentoo Linux Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH. | 7.2 |
2004-12-31 | CVE-2004-2286 | Integer Overflow vulnerability in Multiple Perl Implementation Duplication Operator Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow. | 7.5 |
2000-10-20 | CVE-2000-0703 | Unspecified vulnerability in Larry Wall Perl suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence. | 7.2 |