exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from jaguar

Email addressjaguar at wulab.com
First Active2002-02-19
Last Active2005-06-01
annuaire.txt
Posted Jun 1, 2005
Authored by jaguar | Site jaguar.wulab.com

annuaire netref version 4.2 is susceptible to a remote command execution flaw.

tags | exploit, remote
SHA-256 | e5bbb9d2b62449c51f0599f113e3cd34afe9beab0a052bd9eef867c2f7d76b01
rlprd204.txt
Posted Jun 25, 2004
Authored by jaguar | Site felinemenace.org

Vulnerabilities in rlpr version 2.x include a format string error and boundary error in the msg() function that can lead to remote arbitrary code execution.

tags | advisory, remote, arbitrary, vulnerability, code execution
SHA-256 | 909257fe013334eb749954d5e33494289bf97fdbac67301020845d045a82f68b
dsa-521.txt
Posted Jun 22, 2004
Authored by jaguar | Site debian.org

Debian Security Advisory DSA 521-1 - A format string vulnerability has been discovered in sup, a set of programs to synchronize collections of files across a number of machines, whereby a remote attacker could potentially cause arbitrary code to be executed with the privileges of the supfilesrv process.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2004-0451
SHA-256 | c97c96287dc17e80c241ce806844485d5301d9292c2078a15e158a669306eb14
gemitelv3.txt
Posted Apr 17, 2004
Authored by jaguar | Site wulab.com

Gemitel versions 3.5 and below allow for malicious file inclusion in its affich.php script. This vulnerability allows an attacker to forcibly execute arbitrary scripts from remote resources on the server.

tags | exploit, remote, arbitrary, php, file inclusion
SHA-256 | 483f0f3f00299f5b8710d0ee6366376e76b18b0d54ae99b5df2b8b47f8dac39d
resolver.c
Posted Apr 2, 2003
Authored by jaguar

Mass domain name resolver that takes a file full of IP addresses as input.

tags | tool
systems | unix
SHA-256 | 1e7ebd83d4d2836ad207b8a6a69f7c1349b1863e7d37f837079afbcd63fb7cc9
idefense.wnserver.txt
Posted Oct 1, 2002
Authored by jaguar, David Endler

iDEFENSE Security Advisory 09.30.200 - WN Server v1.18.2 through 2.0.0 are susceptible to remote exploitation of a buffer overflow that an attacker could cause arbitrary code execution under the privileges of the targeted server by issuing WN Server a long GET request. In order to successfully exploit this vulnerability, customized shell code is required to bypass the character filtering that WN Server imposes on the requested URI. Fix available here.

tags | remote, overflow, arbitrary, shell, code execution
SHA-256 | 8772acabc5a220150fee7559f9a705826f25db74d9483f93096f2f63ce078d3e
idefense.libkvm.txt
Posted Sep 17, 2002
Authored by jaguar, David Endler | Site idefense.com

iDEFENSE Security Advisory 09.16.2002 - The FreeBSD ports asmon, ascpu, bubblemon, wmmon, and wmnet2 can be locally manipulated to take advantage of open file descriptors /dev/mem and /dev/kmem to gain root privileges on a target host. These five programs are installed setgid kmem by default. Exploit information included.

tags | exploit, root
systems | freebsd
SHA-256 | 7e94c4f007a31e6fd200b33983f4a6d729c2a8d77e98c69c2ccededfca5bc453
nmap-freak-freebsd4.4-patch
Posted May 5, 2002
Authored by jaguar

Nmap freak patch for FreeBSD 4.4 - Prevents OS fingerprinting, NULL scan, FIN scan, Xmas scan, Connect scan, and Stealth scan.

tags | patch
systems | unix, freebsd
SHA-256 | 828f2070c9d8ae7cff691c13f071e967a44f0cd9f2304f977e178197a2a22cc0
nmap-freak-patch
Posted Feb 19, 2002
Authored by jaguar

This is a kernel patch to prevent stealth, fin, and rst scans. Also slows down the tcp connect scan. Tested on debian potato running 2.4.16. Tested with nmap and queso - Changes OS fingerprint.

tags | kernel, tcp, patch
systems | linux, unix, debian
SHA-256 | 34dc5fef83c2a347dc0f9e61a28b304f44dd7ead8a44a36b2bf875b32880c4a0
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close