
CVE-2003-0900
https://notcve.org/view.php?id=CVE-2003-0900
31 Dec 2003 — Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers. • https://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=108711 •

CVE-2000-0703 – SUIDPerl 5.00503 - Mail Shell Escape
https://notcve.org/view.php?id=CVE-2000-0703
13 Oct 2000 — suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence. • https://www.exploit-db.com/exploits/20141 •

CVE-1999-1386
https://notcve.org/view.php?id=CVE-1999-1386
31 Dec 1999 — Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file. • http://marc.info/?l=bugtraq&m=88932165406213&w=2 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-1999-0034 – BSDi SUIDPerl - Local Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0034
29 May 1997 — Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. • https://www.exploit-db.com/exploits/200 •