exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files

ActivePerlSystemBOF.txt
Posted May 18, 2004
Authored by Oliver

ActiveState's ActivePerl version 5.8.0 and 5.8.3 on the Win32 platform seems to have a buffer overflow that allows for the crashing of Perl.exe.

tags | advisory, overflow, perl
systems | windows
MD5 | ca10a27ff71f233103693960ea389edd

Related Files

Secunia Security Advisory 50937
Posted Oct 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in ActivePerl, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 7d2d895ad387c185bf7e64cfaf7e280e
Secunia Security Advisory 38558
Posted Feb 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ActivePerl, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 1c4022ea5b2e213649d61aa1610508ba
Secunia Security Advisory 37534
Posted Dec 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in ActivePerl, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the affected modules.

tags | advisory, denial of service, vulnerability
MD5 | 49aeb1bde9c5af52915c46cb73a3daed
snmpcheck-1.5.txt
Posted Jul 24, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | a014c48f9bfa42555918cdb6d3170222
Secunia Security Advisory 20328
Posted Jun 5, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kreej has discovered a security issue in ActivePerl, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | 5d0f0fec8515fd5de36ba89c1fba9021
snmpcheck-1.3.pl.txt
Posted Apr 1, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | 78c3e12d760a9bbb0ad0c3e121e00634
snmpcheck.pl.txt
Posted Jan 8, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | 336c228eabd30a3119c070ba6123e9b2
idefense-040504.txt
Posted Apr 5, 2004
Authored by Greg MacManus | Site idefense.com

Remote exploitation of a buffer overflow in the win32_stat function of ActiveState's ActivePerl may allow arbitrary commands to be executed. No check is made on the length of the string before the copy is made allowing long strings to overwrite control information and execution of arbitrary code possible.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2004-0377
MD5 | 590ae553672985943ecb48217599daaa
msnmsgpwd.exe.zip
Posted Sep 6, 2002
Authored by Obscure | Site perl.ob5cure.com

Windows ActivePerl executable which proves the encryption being used by MSN Messenger v4.6 is weak by doing a base64 decode of a registry key.

tags | cracker, registry
systems | windows
MD5 | 146fc1ab9e738b909ff22f7c3ed738fa
msnmsgpasswd.zip
Posted Sep 6, 2002
Authored by Obscure | Site perl.ob5cure.com

Windows ActivePerl source to a script which proves the encryption being used by MSN Messenger v4.6 is weak. Does a base64 decode of a registry key.

tags | cracker, registry
systems | windows
MD5 | 42b9daa8b7e9312a70b74b6d9cbaf8d4
sa_2001-07.txt
Posted Nov 17, 2001
Site nsfocus.com

A remote buffer overflow vulnerability has been found in ActivePerl PerlIS.dll, affecting Microsoft IIS 4 and 5 servers with ActivePerl 5.6.1.629 and earlier versions installed.

tags | remote, overflow
MD5 | a4d0581ef42998ffef9d012d6c763dda
viper13.tar.gz
Posted Dec 20, 1999
Authored by Hale, wiltered_fire

Viper is a standard unix password cracker, but instead of using a wordlist it will generate all the password combinations for the character sets and length you specify. New in this version is the ability to load and save from a progress file, define a minimum password length, and set the number of hours to run. Included in this package is the perl source, which shouldn't be a problem on a unix machine, but for win32 you will need to install the perl interpreters (ActivePerl @ http://www.activestate.com).

tags | web, perl
systems | windows, unix
MD5 | 2c8cb0aae2770f894d647baa55f9a2de
activeperl.516.dos.txt
Posted Aug 17, 1999

ActivePerl v516 and earlier for Windows IIS leave the server vulnerable to denial of service attacks. Exploit description included.

tags | exploit, denial of service
systems | windows
MD5 | 57ee4e95363a4c81d5194c6b2ae7d2a9
Page 1 of 1
Back1Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close