Page 2 of 9 results (0.003 seconds)

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 4

ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl. • https://www.exploit-db.com/exploits/24128 http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html http://marc.info/?l=bugtraq&m=108489894009025&w=2 http://marc.info/?l=full-disclosure&m=108482796105922&w=2 http://marc.info/?l=full-disclosure&m=108483058514596&w=2 http://marc.info/?l=full-disclosure&m=108489112131099&w=2 http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt http://www.perlmonks.org/index.pl? •

CVSS: 10.0EPSS: 3%CPEs: 2EXPL: 0

Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character. Desbordamiento de búfer en la función win32_stat de ActivePerl de ActiveState, y Perl de Larry Wall anterior a 5.8.3 permite a atacantes remotos ejecutar comandos arbitrarios mediante nombres de fichero que terminan en un carácter "" (barra invertida). • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html http://marc.info/?l=bugtraq&m=108118694327979&w=2 http://public.activestate.com/cgi-bin/perlbrowse?patch=22552 http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities http://www.kb.cert.org/vuls/id/722414 https://exchange.xforce.ibmcloud.com/vulnerabilities/15732 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

ActivePython ActiveX control for Python in the AXScript package, when used in Internet Explorer, does not prevent a script from reading files from the client's filesystem, which allows remote attackers to read arbitrary files via a malicious web page containing Python script. El control ActivePython (un ActiveX para Python), cuando es usado en el Internet Explorer, no impide la lectura de archivos del sistema de ficheros del cliente, lo cual permite a atacantes remotos la lectura arbitraria de dichos ficheros mediante una página web que contenga el script Python. • http://marc.info/?t=101113015900001&r=1&w=2 http://www.iss.net/security_center/static/7910.php http://www.securityfocus.com/archive/1/250814 http://www.securityfocus.com/bid/3893 •

CVSS: 7.5EPSS: 47%CPEs: 1EXPL: 5

Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and earlier allows remote attackers to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension. • https://www.exploit-db.com/exploits/21152 https://www.exploit-db.com/exploits/21154 https://www.exploit-db.com/exploits/21153 http://bugs.activestate.com/show_bug.cgi?id=18062 http://marc.info/?l=bugtraq&m=100583978302585&w=2 http://www.osvdb.org/678 http://www.securityfocus.com/bid/3526 https://exchange.xforce.ibmcloud.com/vulnerabilities/7539 •