what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from DiGiT

First Active1999-12-22
Last Active2001-07-18
cfingerd.c
Posted Jul 18, 2001
Authored by DiGiT | Site security.is

Cfingerd v1.4.3 remote root exploit for Linux. Binds to port 113 and sends bogus ident information.

tags | exploit, remote, root
systems | linux
SHA-256 | badd5107b708ecea2476eda90f2a5fe6efe2f9988539733c58710c082a2510d6
ypbind.tgz
Posted Dec 6, 2000
Authored by DiGiT

Linux/x86 remote root exploit for ypbind (ypbind-mt). Tested against Red Hat 7, SuSe 6.x, and Debian.

tags | exploit, remote, x86, root
systems | linux, redhat, suse, debian
SHA-256 | 2b24fda89ac2d6cab494fa7e7579f14e73b189f6e164ba521552fab98bd40eb6
xsunsploit.c
Posted Sep 28, 2000
Authored by DiGiT

Solaris 7 Xsun(suid) local overflow - Solaris 2.7/(2.6?) x86 sploit no sparc code.

tags | exploit, overflow, x86, local
systems | solaris
SHA-256 | e14c2c1b5cb8a44823088162f42622b3a6b9199ed68b1d7dde4508dc148dcd0d
xaosexp.c
Posted May 27, 2000
Authored by DiGiT | Site security.is

/usr/bin/xaos local root buffer overflow exploit. Works on suse 6.1, and could be modified for 6.2.

tags | exploit, overflow, local, root
systems | linux, suse
SHA-256 | 41063c66d14d76b252432334dc2031dd8d874cf94f253caf555c2a55974289a0
ssibug
Posted May 27, 2000
Authored by DiGiT | Site security.is

The thttpd web server comes with a CGI script called /cgi-bin/ssi which allows any file on the system to be read. Exploit URL included.

tags | exploit, web, cgi
SHA-256 | 25679f8183d70073b7bf52ab21666b2b31569ed14056ca67fae4e26e726dd272
lpsetexp.c
Posted May 26, 2000
Authored by DiGiT | Site security.is

solaris 2.7 lpset local exploit, i386.

tags | exploit, local
systems | solaris
SHA-256 | 82677b09b51b7eeb5f50474a25d70291b3e7b4d5eae939b2f28a8b28490519fa
sol7.lp.c
Posted Apr 27, 2000
Authored by DiGiT

Solaris 2.7 /usr/bin/lp local exploit, i386.

tags | exploit, local
systems | solaris
SHA-256 | 9bc5fca1cc87abb07be6db3401607d3a358e4c4094233f749f43579bcc03bce7
xsun2.c
Posted Apr 27, 2000
Authored by DiGiT

xsun2.c is a Solaris 7 x86 local root stack overflow for /usr/openwin/bin/Xsun.

tags | exploit, overflow, x86, local, root
systems | solaris
SHA-256 | 24ed4a994f23f97bc9fed03f609685836e2cbacf45625145eee480f32fadd9b6
kmlocal.c
Posted Dec 22, 1999
Authored by DiGiT | Site security.is

KDE, kmail local email-attachment symlink exploit - possible root comprimise. Kmail older than v1.1.1 is vulnerable.

tags | exploit, local, root
SHA-256 | 4afa410db651af6de289d5b36edc2bec4444366a290b9429cec19406217a4680
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close