Larry Wall : Security Vulnerabilities, CVEs, CVSS score >= 7
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Max CVSS
7.5
EPSS Score
3.35%
Published
2007-11-07
Updated
2018-10-15
Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Max CVSS
7.2
EPSS Score
0.06%
Published
2005-12-16
Updated
2013-10-24
Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
Max CVSS
7.5
EPSS Score
2.37%
Published
2004-12-31
Updated
2017-07-11
Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
Max CVSS
10.0
EPSS Score
3.49%
Published
2004-05-04
Updated
2017-07-11
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2008-09-10
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
Max CVSS
7.2
EPSS Score
0.05%
Published
1997-05-29
Updated
2022-08-17
6 vulnerabilities found