Activestate

Activeperl

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.27%
  • Published 11.10.2012 10:51:57
  • Last modified 11.04.2025 00:51:21

Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C:\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\Perl\Site\bin directory, which is a...

  • EPSS 0.06%
  • Published 06.06.2006 20:06:00
  • Last modified 03.04.2025 01:03:51

ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with "Users" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The ...

Exploit
  • EPSS 1.74%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to ...

Exploit
  • EPSS 7.52%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.

  • EPSS 10.19%
  • Published 04.05.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

Exploit
  • EPSS 35.93%
  • Published 06.12.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and earlier allows remote attackers to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension.