Vulnerabilities > Larry Wall > Perl > 5.5.3

DATE CVE VULNERABILITY TITLE RISK
2005-12-16 CVE-2005-4278 Packages Insecure RUNPATH vulnerability in Gentoo Linux
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
local
low complexity
larry-wall
7.2
2004-12-31 CVE-2004-2286 Integer Overflow vulnerability in Multiple Perl Implementation Duplication Operator
Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
network
low complexity
activestate larry-wall
7.5
2000-10-20 CVE-2000-0703 Unspecified vulnerability in Larry Wall Perl
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
local
low complexity
larry-wall
7.2