Page 6 of 33 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 17EXPL: 0

Untrusted search path vulnerability in Perl before 5.8.7-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH. • http://secunia.com/advisories/17232 http://secunia.com/advisories/55314 http://www.gentoo.org/security/en/glsa/glsa-200510-14.xml http://www.osvdb.org/20086 http://www.securityfocus.com/bid/15120 http://www.vupen.com/english/advisories/2005/2119 •

CVSS: 1.2EPSS: 0%CPEs: 4EXPL: 0

Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452. • ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056 http://fedoranews.org/updates/FEDORA--.shtml http://secunia.com/advisories/14531 http://secunia.com/advisories/17079 http://secunia.com/advisories/18075 http://secunia.com/advisories/18517 http://secunia.com/advisories/55314 http://www.debian.org/security/2005/dsa-696 http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml http:/&# •

CVSS: 2.1EPSS: 0%CPEs: 32EXPL: 2

Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree. • https://www.exploit-db.com/exploits/791 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056 http://fedoranews.org/updates/FEDORA--.shtml http://marc.info/?l=bugtraq&m=110737149402683&w=2 http://marc.info/?l=full-disclosure&m=110779721503111&w=2 http://secunia.com/advisories/14120 http://secunia.com/advisories/55314 http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml http://www.mandriva. •

CVSS: 7.5EPSS: 2%CPEs: 20EXPL: 2

Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow. • https://www.exploit-db.com/exploits/24130 http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0878.html http://www.securityfocus.com/bid/10380 https://exchange.xforce.ibmcloud.com/vulnerabilities/16224 •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack. • ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U http://fedoranews.org/updates/FEDORA--.shtml http://marc.info/?l=bugtraq&m=110547693019788&w=2 http://secunia.com/advisories/12991 http://secunia.com/advisories/18517 http://secunia.com/advisories/55314 http://www.debian.org/security/2004/dsa-620 http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml http://www.redhat.com/support/errata/RHSA-2005-103.html http://www.redhat.com/support/er •