Lucene search

K
ActivestateActiveperl

6 matches found

CVE
CVE
added 2002/03/09 5:0 a.m.54 views

CVE-2001-0815

Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and earlier allows remote attackers to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension.

7.5CVSS7.9AI score0.40905EPSS
CVE
CVE
added 2004/05/04 4:0 a.m.47 views

CVE-2004-0377

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.

10CVSS7.7AI score0.11512EPSS
CVE
CVE
added 2012/10/11 10:51 a.m.42 views

CVE-2012-5377

Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C:\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\Perl\Site\bin directory, which is added to the PATH system environment variable, as ...

6CVSS6.8AI score0.00266EPSS
CVE
CVE
added 2006/06/06 8:6 p.m.37 views

CVE-2006-2856

ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with "Users" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the det...

4.6CVSS6.3AI score0.00058EPSS
CVE
CVE
added 2005/08/04 4:0 a.m.36 views

CVE-2004-2286

Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.

7.5CVSS8.1AI score0.06157EPSS
CVE
CVE
added 2005/05/10 4:0 a.m.34 views

CVE-2004-2022

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclea...

2.1CVSS8.1AI score0.01742EPSS