exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 251 - 275 of 1,435 RSS Feed

Perl Files

Splunk 5.0 Custom App Remote Code Execution
Posted Dec 8, 2012
Authored by sinn3r, juan vazquez, [at]marcwickenden | Site metasploit.com

This Metasploit module exploits a feature of Splunk whereby a custom application can be uploaded through the web based interface. Through the 'script' search command a user can call commands defined in their custom application which includes arbitrary perl or python code. To abuse this behavior, a valid Splunk user with the admin role is required. By default, this module uses the credential of "admin:changeme", the default Administrator credential for Splunk. Note that the Splunk web interface runs as SYSTEM on Windows, or as root on Linux by default. This Metasploit module has only been tested successfully against Splunk 5.0.

tags | exploit, web, arbitrary, root, perl, python
systems | linux, windows
SHA-256 | 638c1ea3c9f99886762f0c13cc824ca25fe4fd419cf32123b703084f0680888f
Secunia Security Advisory 51498
Posted Dec 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module.

tags | advisory, perl, vulnerability
SHA-256 | 88d56c48681844bbb4a4c42c2e99559a927ea838f03125103284763b4d23533c
Secunia Security Advisory 51457
Posted Dec 2, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for perl. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, perl, vulnerability
systems | linux, ubuntu
SHA-256 | 42a2c747ae2a87b136f8cf0be7cc4b96316238e5dda9354e6598df69c8ac512c
NetIQ Privileged User Manager 2.3.1 ldapagnt_eval() Remote Perl Code Execution
Posted Nov 21, 2012
Authored by rgod, juan vazquez | Site metasploit.com

This Metasploit module abuses a lack of authorization in the NetIQ Privileged User Manager service (unifid.exe) to execute arbitrary perl code. The problem exists in the ldapagnt module. The module has been tested successfully on NetIQ PUM 2.3.1 over Windows 2003 SP2, which allows to execute arbitrary code with SYSTEM privileges.

tags | exploit, arbitrary, perl
systems | windows
advisories | OSVDB-87334
SHA-256 | f79aa10f08abac5de98e9a1207c3259575b8c431b2e93a15ad5ebc8cf3d70dee
IP Phone Scanning Made Easy 0.7
Posted Nov 16, 2012
Authored by Cedric Baillet | Site freecode.com

ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.

Changes: Added Cisco phone logout mobility feature abuse. Added multiple exploits.
tags | tool, web, scanner, perl
systems | unix
SHA-256 | 005bb4e3debe6a2d061f32cac8be7405b70d70dd01daa3593789c1e34a3b464e
Novell NetIQ Privileged User Manager 2.3.1 ldapagnt.dll Code Execution
Posted Nov 15, 2012
Authored by rgod | Site retrogod.altervista.org

Novell NetIQ Privileged User Manager version 2.3.1 suffers from a perl code evaluation remote command execution vulnerability in ldapagnt_eval() in ldapagnt.dll. The secure web interface contains a flaw which allows, without prior authentication, to execute a Perl script with SYSTEM privileges. This can be done by sending a POST request with well formed data. Full exploit included.

tags | exploit, remote, web, perl
systems | linux
SHA-256 | f2677910b884afa12ade6e175014677e91e4db77215c215f570b78204891f70b
360-FAAR Firewall Analysis Audit And Repair 0.3.7
Posted Nov 9, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release fixes many of the bugs in the cisco reader and writer sections. Cisco configs can now be processed written, re-read, processed and written again cyclically. Access lists using proto groups, specifying only protocol details or using 'ip/any' services are now handled. Protocol group-objects are written and used in rules for service groups with many different protocol types specified within them. 'port-objects' are read in service objects, service groups and protocol groups alike. The cisco 'echo' default service has been updated to remove tcp and udp from its listed ports.
tags | tool, perl
systems | unix
SHA-256 | 8680b4e7358b1f8228ccc1ad72f65c83c7889eadc6a887adb27b060b96b044df
360-FAAR Firewall Analysis Audit And Repair 0.3.6
Posted Nov 5, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release resolves many of the problems with the filter sections. Both the specific and the subnet rr mode filter sections have been upgraded to fix many of the issues related to combining various filter mode types, and as a result the filter behavior should be much more predictable. The Cisco and od output section definitions now print service defs for all defined proto types.
tags | tool, perl
systems | unix
SHA-256 | a3fb818edceec758687fba61efce8b7819eef7b0a180ab390d69fb0cc2604681
360-FAAR Firewall Analysis Audit And Repair 0.3.5
Posted Nov 1, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release introduces three new sub routines that are used to run much stronger consistency checks against the internal network and service object, group and rule definitions after each round of processing. These new tests provide much greater visibility of incomplete objects and rules and give details of any missing object elements. The netscreen reader now reads "interface dip" and rule "dip-id" statements and adds appropriate objects and nat translation rules. Warnings are printed for unknown cisco object group objects found in policies during the config read. Various other updates.
tags | tool, perl
systems | unix
SHA-256 | 58897c316cdef316065b209473124c0e33020bd1864acd23219ecb8c9c3df0bf
360-FAAR Firewall Analysis Audit And Repair 0.3.4
Posted Oct 29, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release resolves Cisco ICMP default services with out printing stringified hash references in the cs output sections. Cisco network and range objects are listed as such in object-groups instead of as hosts. The cisco output writer uses 'object' in access-lists instead of IP NM, as well as listing range objects using 'range' in access-lists as well as groups. The NAT translation now supports SRC NAT translation for known network objects in rr mode filters.
tags | tool, perl
systems | unix
SHA-256 | 83a14cd01c162dbb2b4f78021b1b6a8d2a95fc60ef2cb2d383c7c55458a39622
Perl 5 Memory Corruption
Posted Oct 26, 2012
Authored by Tim Brown | Site nth-dimension.org.uk

The Perl 5 interpreter is vulnerable to a memory corruption vulnerability which results in memory disclosure and potentially arbitrary code execution when large values are supplied to the x operator.

tags | advisory, arbitrary, perl, code execution
advisories | CVE-2012-5195
SHA-256 | 553cb435fb55599355ceae80210dcc60509e0f1a51cae7259ce1394e8ef9ac7b
360-FAAR Firewall Analysis Audit And Repair 0.3.3
Posted Oct 24, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release adds nat capabilities to the Cisco ASA reader. 'static' nat IP IP NM and access-list statements are now added the internal nats table and policy nat rules are identified. Some of the annoying "undefined" variable warnings have been resolved. Various other updates.
tags | tool, perl
systems | unix
SHA-256 | d9fb0acb155f64254f747054284f388236ebe887cd473089b6502874ce95d0d0
360-FAAR Firewall Analysis Audit And Repair 0.3.2
Posted Oct 17, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release includes a new helper script that converts print mode CSV's to HTML, for easy viewing with a browser on systems without an "office" application suite installed. Netscreen interface vip statements are now added to the NATs table and further consistency checks have been added to the policy build sections to more easily identify problem objects.
tags | tool, perl
systems | unix
SHA-256 | 00af73a5723ae49d0e382b3f6a620781e28c8f7c00bc60484f760918af576d92
Secunia Security Advisory 50845
Posted Oct 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged a vulnerability in Perl included in Solaris, which can be exploited by malicious people to conduct HTTP response splitting attacks in an application using the library.

tags | advisory, web, perl
systems | solaris
SHA-256 | 2bdc292369ad9f4161ed611531974d706929099e0603932ec86a3cd43b842917
360-FAAR Firewall Analysis Audit And Repair 0.3.1
Posted Sep 28, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release cleans up the output in the new columns, so that specific VPN policy and object negation usage is easier to see. The VPN rules marked "Any", which are all rules in the rule base not marked with a specific VPN, that pass traffic that can be tunnelled via a route based VPN after dropping out of the policy, are no longer printed. Object's not negated in the policy (marked negation: "no") are also removed from the new columns for clarity. The Cisco ASA/PIX reader has been upgraded so that it prints more user friendly info during the config read ('safe' warnings are now printed as info) and handles rules using protocol groups far better than before. The cisco config reader now also reads negated source and dest services and excludes rules using these from the "rr" mode rulebase builds as well as reading rules with logging and no destination port correctly.
tags | tool, perl
systems | unix
SHA-256 | 73a58198a8995d01eb38a8a4e8e298fc639af8d7e3d23ed6ebffa7cdcd081379
360-FAAR Firewall Analysis Audit And Repair 0.3.0
Posted Sep 26, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release further updates the 'print' and 'fltprint' mode spreadsheets to include VPN tunnel usage info and source / destination negation from the policy, as well as "install on" info (most relevant to checkpoint).
tags | tool, perl
systems | unix
SHA-256 | cff15dcf5626494896c8a6d4970b7acec184525f959e7e6f3a3be6163debc79b
LFI Exploiter
Posted Sep 26, 2012
Authored by M.R.S.CO

This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.

tags | tool, local, perl, code execution, file inclusion
systems | unix
SHA-256 | bd77eecfb380be0b2302b89fd25fafe9ee987dadd671f7e40d057f74b0ce0ade
360-FAAR Firewall Analysis Audit And Repair 0.2.9
Posted Sep 14, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release further upgrades the NAT analysis capabilities, more NAT details are listed in 'print' mode.
tags | tool, perl
systems | unix
SHA-256 | eca2eafd31b73f79158ba4318dcdb341d71a40f8cdc578fd284dec7337fc4348
360-FAAR Firewall Analysis Audit And Repair 0.2.8
Posted Sep 12, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release further improves the NAT analysis capabilities of 360-FAAR, the output of which is listed in the six new print mode columns, src, dst and service, for both the NAT translations that are listed in the logs and in the policy, for each object.
tags | tool, perl
systems | unix
SHA-256 | 8700cbc53fa4f7a79694f34b2bf1094776e977cd3e78a39a4cef4635ac1697b6
360-FAAR Firewall Analysis Audit And Repair 0.2.7
Posted Sep 8, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release completely drops the previous NAT methodology and integrates NATs into the rule processing subs and also sports a rewrite of the NAT structures and nat rule listing, the new method is much more robust. Negated rules are now identified in Netscreen and excluded from rr mode rulebases.
tags | tool, perl
systems | unix
SHA-256 | f05e778f24d0f3d667c664af3819612b34157e5fa6a0c9419df2282a58ea676e
360-FAAR Firewall Analysis Audit And Repair 0.2.6
Posted Sep 6, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release correctly adds NAT translation rules for interface mip host statements (ANY service name corrected). It also reads policy nat dst ip statements and adds these to the NAT tables in the same was as for interface mip rules.
tags | tool, perl
systems | unix
SHA-256 | d5b8d27f99acdf525362b164557638cfc9cca4a0fa9a3e88299565b9c890caec
360-FAAR Firewall Analysis Audit And Repair 0.2.5
Posted Sep 5, 2012
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release adds 'end.' comments to rr mode "enter search INC EX string" instructions and an 'exit' menu option. This release also resolves netscreen MIP(ipaddr) objects from interface mip statements and adds them to the NATs tables. Various other fixes and additions.
tags | tool, perl
systems | unix
SHA-256 | a8af9a4806465b18cd3cb04ff8798af3257fd0cfdb61642e04c8cd8f73566b47
IP Phone Scanning Made Easy 0.6
Posted Sep 1, 2012
Authored by Cedric Baillet | Site freecode.com

ISME is a small framework to test IP phones from several editors. It can gather information from IP phone infrastructures, test their web servers for default login/password combinations, and also implement attacks against the systems. ISME has been written in perl with a perl/Tk interface to provide a portable and easy to use tool. Full documentation is also provided.

tags | tool, web, scanner, perl
systems | linux, unix
SHA-256 | 052944b549e2c683c0e76cceb786430d87744dc8c6db6eb95c053a158d07f5a5
Secunia Security Advisory 50336
Posted Aug 22, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libconfig-inifiles-perl. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local, perl
systems | linux, ubuntu
SHA-256 | 29be3fbd5004650e559b27e5be365ffd03418493f176d677c36b6c20b6a70cff
Ubuntu Security Notice USN-1543-1
Posted Aug 21, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1543-1 - It was discovered that the perl Config::IniFiles module created temporary files in an unsafe manner. A local user with write access to the directory containing a configuration file that Config-IniFiles manipulates could exploit this to overwrite arbitrary files.

tags | advisory, arbitrary, local, perl
systems | linux, ubuntu
advisories | CVE-2012-2451
SHA-256 | 53f59f33b4b7260067b809db7a270c28dc07def87a2cab40d4971d8d23a2bf82
Page 11 of 58
Back910111213Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    26 Files
  • 27
    Sep 27th
    39 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close