6 results (0.001 seconds)

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 2

11 Oct 2012 — Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C:\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\Perl\Site\bin directory, which is added to the PATH system environment variable, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview. Vulner... • https://www.exploit-db.com/exploits/28130 •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

06 Jun 2006 — ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with "Users" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. • http://secunia.com/advisories/20328 •

CVSS: 9.8EPSS: 1%CPEs: 8EXPL: 4

31 Dec 2004 — ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl. • https://www.exploit-db.com/exploits/24128 •

CVSS: 9.8EPSS: 6%CPEs: 20EXPL: 2

31 Dec 2004 — Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow. • https://www.exploit-db.com/exploits/24130 •

CVSS: 10.0EPSS: 11%CPEs: 2EXPL: 0

05 Apr 2004 — Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character. Desbordamiento de búfer en la función win32_stat de ActivePerl de ActiveState, y Perl de Larry Wall anterior a 5.8.3 permite a atacantes remotos ejecutar comandos arbitrarios mediante nombres de fichero que terminan en un carácter "" (barra invertida). Remote exploitation of a buffer ... • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html •

CVSS: 9.8EPSS: 40%CPEs: 1EXPL: 5

06 Dec 2001 — Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and earlier allows remote attackers to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension. • https://www.exploit-db.com/exploits/21152 •