Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
larry wall perl 5.8.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-0448
Race condition in the rmtree function in File::Path.pm in Perl prior to 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
NA
CVE-2004-0976
Multiple scripts in the perl package in Trustix Secure Linux 1.5 up to and including 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
Larry Wall Perl 5.6
Larry Wall Perl 5.6.1
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.3
NA
CVE-2005-4278
Untrusted search path vulnerability in Perl prior to 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Larry Wall Perl 5.4
Larry Wall Perl 5.4.5
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.3
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.4
Larry Wall Perl
Larry Wall Perl 5.5
Larry Wall Perl 5.5.3
Larry Wall Perl 5.6.1
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.0
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.4.5
NA
CVE-2004-2286
Integer overflow in the duplication operator in ActivePerl allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
Activestate Activeperl 5.6.1
Activestate Activeperl 5.8.1
Activestate Activeperl 5.8.3
Larry Wall Perl 5.6.1
Activestate Activeperl 5.6.1.630
Activestate Activeperl 5.6.2
Larry Wall Perl 5.3
Larry Wall Perl 5.4
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.0
Activestate Activeperl 5.6.3
Activestate Activeperl 5.7.1
Activestate Activeperl 5.7.2
Larry Wall Perl 5.4.5
Larry Wall Perl 5.5
Activestate Activeperl 5.7.3
Activestate Activeperl 5.8
Larry Wall Perl 5.5.3
Larry Wall Perl 5.6
1 EDB exploit
NA
CVE-2003-0900
Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for malicious users to predict random numbers.
Larry Wall Perl 5.8.1
NA
CVE-2005-0156
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Larry Wall Perl 5.8.0
Sgi Propack 3.0
Larry Wall Perl 5.8.4.2
Larry Wall Perl 5.8.4
Larry Wall Perl 5.8.4.5
Larry Wall Perl 5.8.4.3
Larry Wall Perl 5.8.4.2.3
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.4.1
Larry Wall Perl 5.8.4.4
Larry Wall Perl 5.8.3
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Suse Suse Linux 9.0
Ubuntu Ubuntu Linux 4.1
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Ibm Aix 5.3
Suse Suse Linux 8.0
Ibm Aix 5.2
Trustix Secure Linux 1.5
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started