Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
activestate vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2004-2022
ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffe...
Activestate Activeperl 5.7.3
Activestate Activeperl 5.8
Activestate Activeperl 5.7.1
Activestate Activeperl 5.7.2
Activestate Activeperl 5.6.1
Activestate Activeperl 5.6.1.630
Activestate Activeperl 5.6.2
Activestate Activeperl 5.6.3
1 EDB exploit
5
CVSSv2
CVE-2002-0131
ActivePython ActiveX control for Python in the AXScript package, when used in Internet Explorer, does not prevent a script from reading files from the client's filesystem, which allows remote malicious users to read arbitrary files via a malicious web page containing Python ...
Activestate Activepython
Activestate Activepython 2.1
7.5
CVSSv2
CVE-2004-2286
Integer overflow in the duplication operator in ActivePerl allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
Activestate Activeperl 5.6.1
Activestate Activeperl 5.8.1
Activestate Activeperl 5.8.3
Larry Wall Perl 5.6.1
Activestate Activeperl 5.6.1.630
Activestate Activeperl 5.6.2
Larry Wall Perl 5.3
Larry Wall Perl 5.4
Larry Wall Perl 5.8.1
Larry Wall Perl 5.8.3
Larry Wall Perl 5.8.0
Activestate Activeperl 5.6.3
Activestate Activeperl 5.7.1
Activestate Activeperl 5.7.2
Larry Wall Perl 5.4.5
Larry Wall Perl 5.5
Activestate Activeperl 5.7.3
Activestate Activeperl 5.8
Larry Wall Perl 5.5.3
Larry Wall Perl 5.6
1 EDB exploit
7.5
CVSSv2
CVE-2001-0815
Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and previous versions allows remote malicious users to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension.
Activestate Activeperl
3 EDB exploits
6
CVSSv2
CVE-2012-5378
Untrusted search path vulnerability in the installation functionality in ActiveTcl 8.5.12, when installed in the top-level C:\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\TD\bin directory, which is added to the PATH system environment variabl...
Activestate Activetcl 8.5.12
1 EDB exploit
4.6
CVSSv2
CVE-2006-2856
ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with "Users" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this in...
Activestate Activeperl 5.8.8.817
6
CVSSv2
CVE-2012-5377
Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C:\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\Perl\Site\bin directory, which is added to the PATH system enviro...
Activestate Activeperl 5.16.1.1601
1 EDB exploit
6
CVSSv2
CVE-2012-5379
Untrusted search path vulnerability in the installation functionality in ActivePython 3.2.2.3, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the C:\Python27 or C:\Python27\Scripts directory, which may be added ...
Activestate Activepython 3.2.2.3
1 EDB exploit
10
CVSSv2
CVE-2004-0377
Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl prior to 5.8.3 allows local or remote malicious users to execute arbitrary commands via filenames that end in a backslash character.
Activestate Activeperl
Larry Wall Perl
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started