what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from Suid

Email addresssuid at sneakerz.org
First Active1999-12-20
Last Active2001-07-18
ml85p.sh
Posted Jul 18, 2001
Authored by Suid

Local root exploit for /usr/bin/ml85p, a suid binary which is vulnerable to a local symlink attack. It is included in Mandrake 8.0 by default.

tags | exploit, local, root
systems | linux, mandrake
SHA-256 | 7fc636ec99a7121c1576f6a3baa4cfa2f6d10bc5a5797fccdad14335a04ae46a
pgxconfig.sh
Posted Sep 7, 2000
Authored by Suid

TechSource Raptor GFX configurator (pgxconfig) local root exploit.

tags | exploit, local, root
SHA-256 | 140bd06c09d0ea6b4a798e42c65d0be0a4fc0368f2b3fe0d930f987e273ac0f9
012.txt
Posted Aug 2, 2000
Authored by Suid | Site suid.kg

Pgxconfig is a Raptor graphics card configuration tool for Solaris which has multiple local vulnerabilities. The environment is not sanitized and root privileges are not dropped, allowing commands to be run as root. Local root exploit included.

tags | exploit, local, root, vulnerability
systems | solaris
SHA-256 | c672d208fcfc0115d16c23ed363ad4e7466f870b510a0b15f6d338ba4c585b0c
setxconfxploit.c
Posted Jun 19, 2000
Authored by Suid | Site suid.kg

SetXConf local root exploit for Corel linux v1.0 with xconf utils.

tags | exploit, local, root
systems | linux
SHA-256 | db447881a66d9c741450d6d7e316b1bb4edd263812be29422ab468e0194719f4
calendar.pl.vuln
Posted May 17, 2000
Authored by Suid | Site suid.kg

Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.

tags | exploit, remote, web, arbitrary
SHA-256 | 7e8843302cd134bdc683267eeed64db268f619dcb7483ba80947f7f20d7713d0
011.txt
Posted May 16, 2000
Authored by Suid | Site suid.kg

SUID Advisory #11 - Matt Kruse Calandar Script. Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.

tags | remote, web, arbitrary
SHA-256 | 2102559bca4495f792b2ed6f732d45e082c0bb8bbe38bb9c97587966db74cc1c
dosemu.sh
Posted Mar 1, 2000
Authored by Suid

Corel Linux dosemu config error. Local root compromise.

tags | exploit, local, root
systems | linux
SHA-256 | 81ad1e0d833b1891556039a50544c4df1f8a580b3985a0e111e72d5f334fb2f2
setxconf.sh
Posted Mar 1, 2000
Authored by Suid

Corel xconf utils local root (among others) vulnerability.

tags | exploit, local, root
SHA-256 | f6cddf04b692fdedb8346c87a2db5002b0d59c1869dffcfc1a4715f491adcfcf
010.txt
Posted Feb 28, 2000
Authored by Suid | Site suid.kg

SUID Advisory #10 - EZ Shopper 3.0 remote exploit. Anyone can execute any command on the remote system with the priveleges of the web server, and read any file on the remote system.

tags | remote, web
SHA-256 | 34f25822d0c29daeab945d4bb6017e10d3264a9d52550b4c41969e9cf382fd0d
008.txt
Posted Feb 25, 2000
Authored by Suid | Site suid.kg

SUID Advisory #8 - Corel Linux 1.0 dosemu distribution configuration. Local users can take advantage of a packaging and configuration error (which has been known and documented for a long time) to execute arbitrary commands as root. Exploit description included.

tags | arbitrary, local, root
systems | linux
SHA-256 | 96c2147114c2083d447c403b05ebe76f0fce1a1dd0a956feda12721668e91518
007.txt
Posted Feb 25, 2000
Authored by Suid | Site suid.kg

SUID Advisory #7 - Corel xconf utils local root (among others) vulnerability - Local users can take advantage of lack of input validation and the lack of privilege dropping to gain root access, read any file, or perform a denial of service attack on Corel Linux systems.

tags | denial of service, local, root
systems | linux
SHA-256 | e0779a0f39462f1e76553c9a16bd665c4bd32dbc04921ce7b2363ed40212fb1b
006.txt
Posted Feb 25, 2000
Authored by Suid | Site suid.kg

SUID Advisory #6 - form.cgi and message.cgi. Anyone can execute any command on the remote system with the priveleges of the web server.

tags | remote, web, cgi
SHA-256 | 7218fd9d54aa6eeff4bbbbe4da3df325b9a0677e5cf227fce0be65494e9e7c7f
005.txt
Posted Feb 17, 2000
Authored by Suid | Site suid.kg

SUID Advisory #5 - DCFORMS98.CGI Advisory - Anyone can create / truncate any file owned by the web server user.

tags | web, cgi
SHA-256 | 622d24605c915932cd5a7cb660b480ecd49f2adef13453625c046a4da0b01370
004.txt
Posted Feb 17, 2000
Authored by Suid | Site suid.kg

SUID Advisory #4 - BNBFORM.CGI. Any local user can create / append to / truncate any file owned by the web server user (nobody/apache/whatever).

tags | web, local, cgi
SHA-256 | c9aa67b4cd9ecd4e946053852b20e67d6099e04bc39c55ffe31b694f332a9f8e
003_wp.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

Example attack transcript against glftpd. This attack was performed against a default install with a single user account added.

SHA-256 | 70d7d889b43a2d66d151613a1294339e52ec80d676fc66dba686150ebe3bc64f
003.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

SUID Advisory #3 - multiple vulnerabilities with glftpd 1.17.2 and below. glFtpD has several problems which can lead to a remote attacker attaining root on your machine.

tags | remote, root, vulnerability
SHA-256 | a272432d911a54e3fb99833860deb64b564e9d6e701995805392d9edc3b36531
001_addendum.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

SUID Advisory #1 Addendum - Insecure FTP server conventions can lead to remote binary execution on a remote ftp server. Anonymous users or users with valid ftp access only accounts may also execute arbitrary code. Exploit information included.

tags | remote, arbitrary
SHA-256 | 6085619944c5f878275760fe08277ed6862efad582615db209b144b5776e9d0b
002.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

SUID Advisory #2 - Exploit for ascend router bugs as per NAI advisory.

SHA-256 | 8205e35efb8995ce9612e8285e123dadb6501023b4f5997f06706dd7fd8610a9
ftp.conversions.txt
Posted Dec 20, 1999
Authored by Suid | Site suid.edu

There exists a vulnerability with certain configurations of certain ftp daemons with which users with a valid ftp only acccount on a system may execute arbitrary commands (including binaries supplied by themselves). There also exists the possibilty that anonymous ftp users may execute arbitrar y commands (also including binaries supplied by themselves). While this vulnerability is entirely configuration dependent. The required configuration is rather common. Exploit information here.

tags | paper, arbitrary
systems | unix
SHA-256 | 223f01ce4e2ad4bdfbd09c6989851a84ceba7d1fbe6c4a85a5d5802a338bf787
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close