what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 1,430 RSS Feed

Perl Files

Red Hat Security Advisory 2020-2539-01
Posted Jun 12, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2539-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. Issues addressed include denial of service, double free, memory leak, and null pointer vulnerabilities.

tags | advisory, denial of service, perl, vulnerability, protocol, memory leak
systems | linux, redhat
advisories | CVE-2018-18066
SHA-256 | b75ffd39f8f0af177e75202bda5990a8541b3b0997e2d0d7016c81111af3fe88
Gentoo Linux Security Advisory 202006-03
Posted Jun 12, 2020
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202006-3 - Multiple vulnerabilities have been found in Perl, the worst of which could result in a Denial of Service condition. Versions less than 5.30.3 are affected.

tags | advisory, denial of service, perl, vulnerability
systems | linux, gentoo
advisories | CVE-2020-10543, CVE-2020-10878, CVE-2020-12723
SHA-256 | 5e17983e546a9b1f26a96adf8697b8765a0d99f16c9677106675109db939e6c0
Red Hat Security Advisory 2020-1616-01
Posted Apr 28, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability.

tags | advisory, perl
systems | linux, redhat
advisories | CVE-2019-13045
SHA-256 | 4755ae38cfd0e6bb07a08d3bf578cf573cc2657093ba90f2b97a0458e9be6403
Red Hat Security Advisory 2020-1081-01
Posted Apr 1, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-1081-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. Issues addressed include denial of service and null pointer vulnerabilities.

tags | advisory, denial of service, perl, vulnerability, protocol
systems | linux, redhat
advisories | CVE-2018-18066
SHA-256 | ec40839212e192907f3d7a60e7c12daee609836719546612362c98e940ae5973
Debian Security Advisory 4615-1
Posted Feb 3, 2020
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4615-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Malicious rule or configuration files, possibly downloaded from an updates server, could execute arbitrary commands under multiple scenarios.

tags | advisory, arbitrary, perl, vulnerability
systems | linux, debian
advisories | CVE-2020-1930, CVE-2020-1931
SHA-256 | 03a369105465ab891d0ad9ac2729ea84660e0bb558e98aa0f5f19ad82d5d3bfe
Debian Security Advisory 4584-1
Posted Dec 16, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis.

tags | advisory, perl, vulnerability
systems | linux, debian
advisories | CVE-2018-11805, CVE-2019-12420
SHA-256 | ac82a1ef36ce591113a90f458a419c2bb1a617841da231a3584911015337b922
Gentoo Linux Security Advisory 201909-01
Posted Sep 6, 2019
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201909-1 - Multiple vulnerabilities have been found in Perl, the worst of which could result in the arbitrary execution of code. Versions less than 5.28.2 are affected.

tags | advisory, arbitrary, perl, vulnerability
systems | linux, gentoo
advisories | CVE-2018-18311, CVE-2018-18312, CVE-2018-18313, CVE-2018-18314, CVE-2018-6797, CVE-2018-6798, CVE-2018-6913
SHA-256 | b9a00e1e7aadf66dc3afffae944c15940289010215cad6e8e25e0089b75effb4
Webmin 1.920 password_change.cgi Backdoor
Posted Aug 23, 2019
Authored by wvu | Site metasploit.com

This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled.

tags | exploit, perl
advisories | CVE-2019-15107
SHA-256 | a77b36da3b341bc12695770cadbf155d839a3d53526172e82c4c2022be857299
Red Hat Security Advisory 2019-2400-01
Posted Aug 7, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.

tags | advisory, web, overflow, perl
systems | linux, redhat
advisories | CVE-2018-18311
SHA-256 | 40cb0438d7e5583476efd1460c7ad022ae9f70b85d61b6f7f310bd1aa53ba633
Red Hat Security Advisory 2019-2097-01
Posted Aug 6, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability.

tags | advisory, perl
systems | linux, redhat
advisories | CVE-2018-12015
SHA-256 | b503047a7be676f8471bbf9a3187ab71674e8aa318ac5d13a41673d9a39256ba
Red Hat Security Advisory 2019-1942-01
Posted Jul 30, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.

tags | advisory, web, overflow, perl
systems | linux, redhat
advisories | CVE-2018-18311
SHA-256 | 5f3316373fff4ff7834990535bbac6a8a02a4b465479cb9ff9cf12ff88b8712d
Red Hat Security Advisory 2019-1790-01
Posted Jul 16, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.

tags | advisory, web, overflow, perl
systems | linux, redhat
advisories | CVE-2018-18311
SHA-256 | f8cb5dc723172a0e5fdef1ecaaeb6bac246d86da717f44ccfdc0859dcabcafc0
Red Hat Security Advisory 2019-0109-01
Posted Jan 22, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0109-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.

tags | advisory, web, overflow, perl
systems | linux, redhat
advisories | CVE-2018-18311
SHA-256 | b1ef1fa7d16ecfb48c11f415e4e5e368502bea096e17ffb0be893cdb24cf9523
Red Hat Security Advisory 2019-0010-01
Posted Jan 3, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0010-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.

tags | advisory, web, overflow, perl
systems | linux, redhat
advisories | CVE-2018-18311, CVE-2018-18312, CVE-2018-18313, CVE-2018-18314
SHA-256 | 6a946ae50e9fafca261fd69e665346cd3a3c1cb7ed58141fd56464013ba2b889
Red Hat Security Advisory 2019-0001-01
Posted Jan 3, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0001-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability.

tags | advisory, web, overflow, perl
systems | linux, redhat
advisories | CVE-2018-18311, CVE-2018-18312, CVE-2018-18313, CVE-2018-18314
SHA-256 | 074d17eedfa53c01db2def9f5e36c71a8294bcb45db8770d31b5b9b148b182f3
Ubuntu Security Notice USN-3834-2
Posted Dec 3, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3834-2 - USN-3834-1 fixed a vulnerability in perl. This update provides the corresponding update for Ubuntu 12.04 ESM. Jayakrishna Menon discovered that Perl incorrectly handled Perl_my_setenv. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, perl
systems | linux, ubuntu
advisories | CVE-2018-18311, CVE-2018-18313
SHA-256 | 54c0d33fe4ea8b359adb223b16e381b96e53750e4f74f4fe2d1338108613a4ff
Ubuntu Security Notice USN-3834-1
Posted Dec 3, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3834-1 - Jayakrishna Menon discovered that Perl incorrectly handled Perl_my_setenv. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. Eiichi Tsukata discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 18.10. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, perl
systems | linux, ubuntu
advisories | CVE-2018-18311, CVE-2018-18312, CVE-2018-18313, CVE-2018-18314
SHA-256 | 6d6b23a9c760d7966484433c478d8ec08db48f2d81ff6256f4b51ac6d78f32e1
Debian Security Advisory 4347-1
Posted Nov 30, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4347-1 - Multiple vulnerabilities were discovered in the implementation of the Perl programming language.

tags | advisory, perl, vulnerability
systems | linux, debian
advisories | CVE-2018-18311, CVE-2018-18312, CVE-2018-18313, CVE-2018-18314
SHA-256 | 693b5b860a9f8cea84d3e3b377ab5b2c4b932965f11e4d4715f272144663f79b
Ubuntu Security Notice USN-3825-2
Posted Nov 22, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3825-2 - USN-3825-1 fixed a vulnerability in mod_perl. This update provides the corresponding update for Ubuntu 12.04 ESM. Jan Ingvoldstad discovered that mod_perl incorrectly handled configuration options to disable being used by unprivileged users, contrary to the documentation. A local attacker could possibly use this issue to execute arbitrary Perl code. Various other issues were also addressed.

tags | advisory, arbitrary, local, perl
systems | linux, ubuntu
advisories | CVE-2011-2767
SHA-256 | 1b1e6ad8075ce1a8e0dd189f0aae49a13fc9dfe537a81342ec40fd1086539b9f
Ubuntu Security Notice USN-3825-1
Posted Nov 21, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3825-1 - Jan Ingvoldstad discovered that mod_perl incorrectly handled configuration options to disable being used by unprivileged users, contrary to the documentation. A local attacker could possibly use this issue to execute arbitrary Perl code.

tags | advisory, arbitrary, local, perl
systems | linux, ubuntu
advisories | CVE-2011-2767
SHA-256 | 5b17dfd97bb51e119ad34a3ed37a9e4c1e842b8caba6d714048f3bd49831661c
SIPPTS 1.2.2
Posted Oct 23, 2018
Authored by Pepelux

SIPPTS is a set of tools to audit VoIP servers and devices using the SIP protocol. It is a set of perl scripts that allow you to identify extensions, remotely crack passwords, check for missing authentication to make phone calls, and more.

tags | tool, perl, telephony, protocol
SHA-256 | 3b3b1fe11ef018073d9b9a1c65106f80b2f32f55cf4755c36a56b598a19853c2
Red Hat Security Advisory 2018-2826-01
Posted Sep 27, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2826-01 - Mod_perl incorporates a Perl interpreter into the Apache web server, such that the Apache HTTP server can directly execute Perl code. Issues addressed include a code execution vulnerability.

tags | advisory, web, perl, code execution
systems | linux, redhat
advisories | CVE-2011-2767
SHA-256 | ac9aa4c6261769c2d22dbde4257dfbf26f2c23a34a9237188e0837eec6dda572
Red Hat Security Advisory 2018-2825-01
Posted Sep 27, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2825-01 - Mod_perl incorporates a Perl interpreter into the Apache web server, such that the Apache HTTP server can directly execute Perl code. Issues addressed include a code execution vulnerability.

tags | advisory, web, perl, code execution
systems | linux, redhat
advisories | CVE-2011-2767
SHA-256 | a11d5e847d6c1ff56b2c9c8a869908db8232a62f8df3b151cc7da252ed065f2a
Red Hat Security Advisory 2018-2737-01
Posted Sep 24, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2737-01 - Mod_perl incorporates a Perl interpreter into the Apache web server, such that the Apache HTTP server can directly execute Perl code. Issues addressed include a code execution vulnerability.

tags | advisory, web, perl, code execution
systems | linux, redhat
advisories | CVE-2011-2767
SHA-256 | 6202248d90e51e0eb67ade76fd24b34a15dd2acfd30c4bbe4ca1cbf8a415d0b6
Debian Security Advisory 4300-1
Posted Sep 24, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4300-1 - It was discovered that Archive::Zip, a perl module for manipulation of ZIP archives, is prone to a directory traversal vulnerability. An attacker able to provide a specially crafted archive for processing can take advantage of this flaw to overwrite arbitrary files during archive extraction.

tags | advisory, arbitrary, perl
systems | linux, debian
advisories | CVE-2018-10860
SHA-256 | 24b66271204e48260c278858e93a3d197b16c2374c13e4091face6dfc00b94cf
Page 3 of 58
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close