what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from jaguar

Email addressjaguar at wulab.com
First Active2002-02-19
Last Active2005-06-01
annuaire.txt
Posted Jun 1, 2005
Authored by jaguar | Site jaguar.wulab.com

annuaire netref version 4.2 is susceptible to a remote command execution flaw.

tags | exploit, remote
SHA-256 | e5bbb9d2b62449c51f0599f113e3cd34afe9beab0a052bd9eef867c2f7d76b01
rlprd204.txt
Posted Jun 25, 2004
Authored by jaguar | Site felinemenace.org

Vulnerabilities in rlpr version 2.x include a format string error and boundary error in the msg() function that can lead to remote arbitrary code execution.

tags | advisory, remote, arbitrary, vulnerability, code execution
SHA-256 | 909257fe013334eb749954d5e33494289bf97fdbac67301020845d045a82f68b
dsa-521.txt
Posted Jun 22, 2004
Authored by jaguar | Site debian.org

Debian Security Advisory DSA 521-1 - A format string vulnerability has been discovered in sup, a set of programs to synchronize collections of files across a number of machines, whereby a remote attacker could potentially cause arbitrary code to be executed with the privileges of the supfilesrv process.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2004-0451
SHA-256 | c97c96287dc17e80c241ce806844485d5301d9292c2078a15e158a669306eb14
gemitelv3.txt
Posted Apr 17, 2004
Authored by jaguar | Site wulab.com

Gemitel versions 3.5 and below allow for malicious file inclusion in its affich.php script. This vulnerability allows an attacker to forcibly execute arbitrary scripts from remote resources on the server.

tags | exploit, remote, arbitrary, php, file inclusion
SHA-256 | 483f0f3f00299f5b8710d0ee6366376e76b18b0d54ae99b5df2b8b47f8dac39d
resolver.c
Posted Apr 2, 2003
Authored by jaguar

Mass domain name resolver that takes a file full of IP addresses as input.

tags | tool
systems | unix
SHA-256 | 1e7ebd83d4d2836ad207b8a6a69f7c1349b1863e7d37f837079afbcd63fb7cc9
idefense.wnserver.txt
Posted Oct 1, 2002
Authored by jaguar, David Endler

iDEFENSE Security Advisory 09.30.200 - WN Server v1.18.2 through 2.0.0 are susceptible to remote exploitation of a buffer overflow that an attacker could cause arbitrary code execution under the privileges of the targeted server by issuing WN Server a long GET request. In order to successfully exploit this vulnerability, customized shell code is required to bypass the character filtering that WN Server imposes on the requested URI. Fix available here.

tags | remote, overflow, arbitrary, shell, code execution
SHA-256 | 8772acabc5a220150fee7559f9a705826f25db74d9483f93096f2f63ce078d3e
idefense.libkvm.txt
Posted Sep 17, 2002
Authored by jaguar, David Endler | Site idefense.com

iDEFENSE Security Advisory 09.16.2002 - The FreeBSD ports asmon, ascpu, bubblemon, wmmon, and wmnet2 can be locally manipulated to take advantage of open file descriptors /dev/mem and /dev/kmem to gain root privileges on a target host. These five programs are installed setgid kmem by default. Exploit information included.

tags | exploit, root
systems | freebsd
SHA-256 | 7e94c4f007a31e6fd200b33983f4a6d729c2a8d77e98c69c2ccededfca5bc453
nmap-freak-freebsd4.4-patch
Posted May 5, 2002
Authored by jaguar

Nmap freak patch for FreeBSD 4.4 - Prevents OS fingerprinting, NULL scan, FIN scan, Xmas scan, Connect scan, and Stealth scan.

tags | patch
systems | unix, freebsd
SHA-256 | 828f2070c9d8ae7cff691c13f071e967a44f0cd9f2304f977e178197a2a22cc0
nmap-freak-patch
Posted Feb 19, 2002
Authored by jaguar

This is a kernel patch to prevent stealth, fin, and rst scans. Also slows down the tcp connect scan. Tested on debian potato running 2.4.16. Tested with nmap and queso - Changes OS fingerprint.

tags | kernel, tcp, patch
systems | linux, unix, debian
SHA-256 | 34dc5fef83c2a347dc0f9e61a28b304f44dd7ead8a44a36b2bf875b32880c4a0
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close