what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 176 - 200 of 1,430 RSS Feed

Perl Files

Red Hat Security Advisory 2014-0321-01
Posted Mar 24, 2014
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2014-0321-01 - The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. A buffer overflow flaw was found in the way the decode_icmp_msg() function in the ICMP-MIB implementation processed Internet Control Message Protocol message statistics reported in the /proc/net/snmp file. A remote attacker could send a message for each ICMP message type, which could potentially cause the snmpd service to crash when processing the /proc/net/snmp file.

tags | advisory, remote, overflow, perl, protocol
systems | linux, redhat
advisories | CVE-2014-2284
SHA-256 | eed20b6823d411b76ec67ad4e096e4db4919dcef35c74801bb53e46ffbac5c15
Debian Security Advisory 2873-2
Posted Mar 24, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2873-2 - It was discovered that the recent file update, DSA-2873-1, introduced a regression in the recognition of Perl scripts containing BEGIN code blocks.

tags | advisory, perl
systems | linux, debian
SHA-256 | 139056d024e837938143454b0c60fea8616e2792361357360989db9949788139
Rootkit Hunter 1.4.2
Posted Mar 23, 2014
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: DISABLE_UNHIDE option has been removed from the configuration file. Various bug fixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | 789cc84a21faf669da81e648eead2e62654cfbe0b2d927119d8b1e55b22b65c3
Mandriva Linux Security Advisory 2014-062
Posted Mar 17, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-062 - Multiple XSS, CSRF, and arbitrary code execution vulnerabilities that impact Webmin versions prior to 1.620. SA51201. The 1.680 version fixed security issues that could be exploited by un-trusted Webmin users in the PHP Configuration and Webalizer modules. The Authen::Libwrap perl module used by Webmin is also being provided. The updated packages have been upgraded to the 1.680 version which is not vulnerable to these issues.

tags | advisory, arbitrary, perl, php, vulnerability, code execution
systems | linux, mandriva
advisories | CVE-2012-2981, CVE-2012-2982, CVE-2012-2983, CVE-2012-4893
SHA-256 | 27b82adda7cb7ed9776d3685dcfbfc3fe196fe892f153a6b846e4276aa1cd841
Mandriva Linux Security Advisory 2014-060
Posted Mar 14, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-060 - Imapsync, by default, runs a release check when executed, which causes imapsync to connect to http://imapsync.lamiral.info and send information about the version of imapsync, the operating system and perl. The imapsync package has been patched to disable this feature. In imapsync before 1.584, a certificate verification failure when using the --tls option results in imapsync attempting a cleartext login.

tags | advisory, web, perl
systems | linux, mandriva
advisories | CVE-2013-4279, CVE-2014-2014
SHA-256 | d7179931ea113dcaae71ae75cb498eeb6441d0deded88193dfac9bedc9b4b1b6
Mandriva Linux Security Advisory 2014-052
Posted Mar 13, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-052 - Remotely exploitable denial of service vulnerability in Net-SNMP, in the Linux implementation of the ICMP-MIB, making the SNMP agent vulnerable if it is making use of the ICMP-MIB table objects. Remotely exploitable denial of service vulnerability in Net-SNMP, in snmptrapd, due to how it handles trap requests with an empty community string when the perl handler is enabled.

tags | advisory, denial of service, perl
systems | linux, mandriva
advisories | CVE-2014-2284, CVE-2014-2285
SHA-256 | 5321b6a85466163f258effee601462d0d873c80a7e36fa1ba6faaf05959c81dc
Kloxo Remote Root Exploit
Posted Mar 2, 2014
Authored by Simo Ben Youssef | Site morxploit.com

Kloxo remote root exploit that leverages a blind SQL injection and injects a perl connect back shell (/bin/sh) with root privilege.

tags | exploit, remote, shell, root, perl, sql injection
SHA-256 | 213c3c585b47a14933b6124a7f1920fbb8c4e5c0810f0b6ed489b24fed1bacf7
NTP Denial Of Service
Posted Feb 17, 2014
Authored by ShadowHatesYou

This is a small perl script called NTP DRDoS which is a denial of service tool for use against NTP.

tags | denial of service, perl
SHA-256 | aace077f2d1467ac05f3510cdb0dd50536eb654724f84af89c96b51140890230
FGscanner Directory / Page Scanner 1.1
Posted Feb 9, 2014
Authored by FantaGhost | Site fantaghost.com

FantaGhost is a perl script that assists with penetration testing by scanning for hidden directories and pages.

Changes: This is a new release with User Agent randomization for better evasion.
tags | tool, scanner, perl
systems | unix
SHA-256 | d371bb05da37e66d3eaf99b61f1c5b87c7c22a1ec2a2da466d32ec49b6648899
Ubuntu Security Notice USN-2099-1
Posted Feb 5, 2014
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2099-1 - It was discovered that Perl's Locale::Maketext module incorrectly handled backslashes and fully qualified method names. An attacker could possibly use this flaw to execute arbitrary code when an application used untrusted templates.

tags | advisory, arbitrary, perl
systems | linux, ubuntu
advisories | CVE-2012-6329
SHA-256 | da5f11c08898e9ebb91735f266683b787a02a7ceb86277819ba80fa40377ef5c
Gentoo Linux Security Advisory 201402-04
Posted Feb 4, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201402-4 - Multiple vulnerabilities have been found in libwww-perl, the worst of which could allow attackers to execute arbitrary code. Versions less than 6.30.0 are affected.

tags | advisory, arbitrary, perl, vulnerability
systems | linux, gentoo
advisories | CVE-2010-2253, CVE-2011-0633
SHA-256 | fcf4a9d24a64af0d45ccfe4eeeaac5b293d0ff2ab6df35386844d9029a6651cf
Gentoo Linux Security Advisory 201401-33
Posted Jan 30, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201401-33 - A vulnerability has been found in the Digest-Base Perl module, allowing remote attackers to execute arbitrary code. Versions less than 1.170.0 are affected.

tags | advisory, remote, arbitrary, perl
systems | linux, gentoo
advisories | CVE-2011-3597
SHA-256 | 073b067938255df59111607a647be7a61207ceda164ae0bab0a2f2e8b3d64f0f
Mandriva Linux Security Advisory 2014-021
Posted Jan 24, 2014
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2014-021 - It was reported that perl-Proc-Daemon, when instructed to write a pid file, does that with a umask set to 0, so the pid file ends up with mode 666, allowing any user on the system to overwrite it.

tags | advisory, perl
systems | linux, mandriva
advisories | CVE-2013-7135
SHA-256 | 05feabcd42048ef05480549d29b92bb9644404398225353fca335e295da4c1c2
Gentoo Linux Security Advisory 201401-11
Posted Jan 20, 2014
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201401-11 - Multiple vulnerabilities have been found in Perl and Locale::Maketext Perl module, the worst of which could allow a context-dependent attacker to execute arbitrary code. Versions less than 5.16.3 are affected.

tags | advisory, arbitrary, perl, vulnerability
systems | linux, gentoo
advisories | CVE-2011-2728, CVE-2011-2939, CVE-2012-5195, CVE-2013-1667
SHA-256 | 92d8d5759a27b001185c6521fec4e8b39a433512603eecfa0564f8a319809a00
DNS Enumerate 1.2.3
Posted Jan 8, 2014
Authored by Filip Waeytens

dnsenum is a perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results. It has been completely revamped.

Changes: Google scraping fixed. Output fixed with latest version of Perl Net::DNS. Wildcard DNS issues fixed. Bind Version detection removed.
tags | tool, scanner, perl
systems | unix
SHA-256 | c2583590e7431b48cb755b13575728b862ffe0778fc9ab445785f32899455590
LFI Exploiter 1.1
Posted Dec 8, 2013
Authored by M.R.S.CO

This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.

Changes: Various updates.
tags | tool, local, perl, code execution, file inclusion
systems | unix
SHA-256 | 7ce9af081371d3aac6a99db29aef3d8887c46d12ee280d8061b70faa5799c0f2
Gentoo Linux Security Advisory 201311-17
Posted Nov 30, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201311-17 - Multiple vulnerabilities were found in Perl, the worst of which could allow a local attacker to cause a Denial of Service condition. Versions less than 5.12.3-r1 are affected.

tags | advisory, denial of service, local, perl, vulnerability
systems | linux, gentoo
advisories | CVE-2008-5302, CVE-2008-5303, CVE-2010-1158, CVE-2011-0761, CVE-2011-1487
SHA-256 | 17bc7911b1233ec593e55fce4bd6168ee82f0df54d00136756cc65e61e2a42aa
NETGEAR ReadyNAS Perl Code Evaluation
Posted Nov 25, 2013
Authored by H D Moore, juan vazquez, Craig Young | Site metasploit.com

This Metasploit module exploits a Perl code injection on NETGEAR ReadyNAS 4.2.23 and 4.1.11. The vulnerability exists on the web fronted, specifically on the np_handler.pl component, due to the insecure usage of the eval() perl function. This Metasploit module has been tested successfully on a NETGEAR ReadyNAS 4.2.23 Firmware emulated environment, not on real hardware.

tags | exploit, web, perl
advisories | CVE-2013-2751, OSVDB-98826
SHA-256 | bde67c6d5bd2eaadf289392fe66c898b1b40583f113cc479740f75c0912c0b93
Mandriva Linux Security Advisory 2013-282
Posted Nov 25, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-282 - Jonathan Dolle reported a design error in HTTP::Body, a Perl module for processing data from HTTP POST requests. The HTTP body multipart parser creates temporary files which preserve the suffix of the uploaded file. An attacker able to upload files to a service that uses HTTP::Body::Multipart could potentially execute commands on the server if these temporary filenames are used in subsequent commands without further checks.

tags | advisory, web, perl
systems | linux, mandriva
advisories | CVE-2013-4407
SHA-256 | ae8a09f529384327fb193842fcebddd1a96d9cfda45247e283628ee923156f50
Debian Security Advisory 2801-1
Posted Nov 21, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2801-1 - Jonathan Dolle reported a design error in HTTP::Body, a Perl module for processing data from HTTP POST requests. The HTTP body multipart parser creates temporary files which preserve the suffix of the uploaded file. An attacker able to upload files to a service that uses HTTP::Body::Multipart could potentially execute commands on the server if these temporary filenames are used in subsequent commands without further checks.

tags | advisory, web, perl
systems | linux, debian
advisories | CVE-2013-4407
SHA-256 | ab519a2ad25a4dd355fa972fa98e656f4b1f2cc7c32d2e60a9114ecd18c29725
MorxCrack 1.2
Posted Nov 18, 2013
Authored by Simo Ben Youssef

MorxCrack is a cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords.

tags | tool, cracker, perl
systems | linux
SHA-256 | 3469672d2407862ceff8521d2671628ae33a178e865f4763afa9a0696e861072
MorXBrute Password Cracker 1.01
Posted Nov 8, 2013
Authored by Simo Ben Youssef

MorXBrute is a customizable HTTP dictionary-based password cracking tool written in Perl. MorXBrute comes with a few payloads for some of the more popular software used and additionally lets you add your own payloads. MorXBrute supports both GET and POST brute forcing.

tags | tool, web, cracker, perl
systems | linux
SHA-256 | ed4fe1e137b11ec8313a821cd13394c1d7af7620e2f8a182f3dbf4af9349d837
WatchGuard Firewall XTM 11.7.4u1 Buffer Overflow Perl Exploit
Posted Oct 28, 2013
Authored by Jerome Nokin | Site funoverip.net

WatchGuard Firewall XTM version 11.7.4u1 suffers from a remote buffer overflow vulnerability in the handling of the sessionid cookie. This is the perl version of the exploit.

tags | exploit, remote, overflow, perl
advisories | CVE-2013-6021
SHA-256 | 45ceb4ca62ced50ff5102abdde412ea0e3161ebbaec885e97cd203a93e46c185
FGscanner Directory / Page Scanner
Posted Oct 20, 2013
Authored by FantaGhost | Site fantaghost.com

FantaGhost is a perl script that assists with penetration testing by scanning for hidden directories and pages.

tags | tool, scanner, perl
systems | unix
SHA-256 | de3d7da80da7a9e25f88605774eee513ce090e983c4a83f3f0bae900bb0affb7
Gentoo Linux Security Advisory 201310-11
Posted Oct 17, 2013
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201310-11 - An insecure temporary file usage has been reported in the Perl Parallel-ForkManager module, possibly allowing symlink attacks. Versions less than 1.20.0 are affected.

tags | advisory, perl
systems | linux, gentoo
advisories | CVE-2011-4115
SHA-256 | 55ba6a531a616f0a3152dc079409941b84363ffbd17b75937fab39b1ccd25d83
Page 8 of 58
Back678910Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close