
CVE-2005-0155 – Setuid perl - 'PerlIO_Debug()' Root Owned File Creation Privilege Escalation
https://notcve.org/view.php?id=CVE-2005-0155
07 Feb 2005 — The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable. • https://www.exploit-db.com/exploits/792 •

CVE-2004-2286 – ActivePerl 5.x / Larry Wall Perl 5.x - Duplication Operator Integer Overflow
https://notcve.org/view.php?id=CVE-2004-2286
31 Dec 2004 — Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow. • https://www.exploit-db.com/exploits/24130 •

CVE-2004-0452
https://notcve.org/view.php?id=CVE-2004-0452
21 Dec 2004 — Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. • ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U •

CVE-2004-0976
https://notcve.org/view.php?id=CVE-2004-0976
20 Oct 2004 — Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files. • http://fedoranews.org/updates/FEDORA--.shtml •

CVE-2004-0377
https://notcve.org/view.php?id=CVE-2004-0377
06 Apr 2004 — Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character. Desbordamiento de búfer en la función win32_stat de ActivePerl de ActiveState, y Perl de Larry Wall anterior a 5.8.3 permite a atacantes remotos ejecutar comandos arbitrarios mediante nombres de fichero que terminan en un carácter "" (barra invertida). • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html •

CVE-2003-0900
https://notcve.org/view.php?id=CVE-2003-0900
31 Dec 2003 — Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers. • https://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=108711 •

CVE-2000-0703 – SUIDPerl 5.00503 - Mail Shell Escape
https://notcve.org/view.php?id=CVE-2000-0703
13 Oct 2000 — suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence. • https://www.exploit-db.com/exploits/20141 •

CVE-1999-1386
https://notcve.org/view.php?id=CVE-1999-1386
31 Dec 1999 — Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file. • http://marc.info/?l=bugtraq&m=88932165406213&w=2 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-1999-0034 – BSDi SUIDPerl - Local Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0034
29 May 1997 — Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. • https://www.exploit-db.com/exploits/200 •