Get a Pentest and security assessment of your IT network.

2021-current

CVE-2020-26292 – Creeper is an experimental dynamic, interpreted language. The binary rele

Creeper is an experimental dynamic, interpreted language. The binary release of Creeper Interpreter 1.1.3 contains potential malware. The compromised binary release was available for a few hours between December 26, 2020 at 3:22 PM EST to December 26, 2020 at 11:00 PM EST. If you used the source code, you are **NOT** affected. This only affects the binary releases. The binary of unknown quality has been removed from the release. If you have downloaded the binary, please delete it and run a reputable antivirus scanner to ensure that your computer is clean.

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26292

Reference (s):

  • https://github.com/chatter-social/Creeper/security/advisories/GHSA-9v67-g2rg-m33j
  • URL: https://github.com/chatter-social/Creeper/security/advisories/GHSA-9v67-g2rg-m33j
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2014-8508 - Cross-site scripting (XSS) vulnerability in s_network.asp in the Denon AV

2021-current

CVE-2020-0297 - In devicepolicy service, there is a possible permission bypass due to an

2021-current

CVE-2020-14315 - A memory corruption vulnerability is present in bspatch as shipped in Col