what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from DiGiT

First Active1999-12-22
Last Active2001-07-18
cfingerd.c
Posted Jul 18, 2001
Authored by DiGiT | Site security.is

Cfingerd v1.4.3 remote root exploit for Linux. Binds to port 113 and sends bogus ident information.

tags | exploit, remote, root
systems | linux
SHA-256 | badd5107b708ecea2476eda90f2a5fe6efe2f9988539733c58710c082a2510d6
ypbind.tgz
Posted Dec 6, 2000
Authored by DiGiT

Linux/x86 remote root exploit for ypbind (ypbind-mt). Tested against Red Hat 7, SuSe 6.x, and Debian.

tags | exploit, remote, x86, root
systems | linux, redhat, suse, debian
SHA-256 | 2b24fda89ac2d6cab494fa7e7579f14e73b189f6e164ba521552fab98bd40eb6
xsunsploit.c
Posted Sep 28, 2000
Authored by DiGiT

Solaris 7 Xsun(suid) local overflow - Solaris 2.7/(2.6?) x86 sploit no sparc code.

tags | exploit, overflow, x86, local
systems | solaris
SHA-256 | e14c2c1b5cb8a44823088162f42622b3a6b9199ed68b1d7dde4508dc148dcd0d
xaosexp.c
Posted May 27, 2000
Authored by DiGiT | Site security.is

/usr/bin/xaos local root buffer overflow exploit. Works on suse 6.1, and could be modified for 6.2.

tags | exploit, overflow, local, root
systems | linux, suse
SHA-256 | 41063c66d14d76b252432334dc2031dd8d874cf94f253caf555c2a55974289a0
ssibug
Posted May 27, 2000
Authored by DiGiT | Site security.is

The thttpd web server comes with a CGI script called /cgi-bin/ssi which allows any file on the system to be read. Exploit URL included.

tags | exploit, web, cgi
SHA-256 | 25679f8183d70073b7bf52ab21666b2b31569ed14056ca67fae4e26e726dd272
lpsetexp.c
Posted May 26, 2000
Authored by DiGiT | Site security.is

solaris 2.7 lpset local exploit, i386.

tags | exploit, local
systems | solaris
SHA-256 | 82677b09b51b7eeb5f50474a25d70291b3e7b4d5eae939b2f28a8b28490519fa
sol7.lp.c
Posted Apr 27, 2000
Authored by DiGiT

Solaris 2.7 /usr/bin/lp local exploit, i386.

tags | exploit, local
systems | solaris
SHA-256 | 9bc5fca1cc87abb07be6db3401607d3a358e4c4094233f749f43579bcc03bce7
xsun2.c
Posted Apr 27, 2000
Authored by DiGiT

xsun2.c is a Solaris 7 x86 local root stack overflow for /usr/openwin/bin/Xsun.

tags | exploit, overflow, x86, local, root
systems | solaris
SHA-256 | 24ed4a994f23f97bc9fed03f609685836e2cbacf45625145eee480f32fadd9b6
kmlocal.c
Posted Dec 22, 1999
Authored by DiGiT | Site security.is

KDE, kmail local email-attachment symlink exploit - possible root comprimise. Kmail older than v1.1.1 is vulnerable.

tags | exploit, local, root
SHA-256 | 4afa410db651af6de289d5b36edc2bec4444366a290b9429cec19406217a4680
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    11 Files
  • 8
    Dec 8th
    45 Files
  • 9
    Dec 9th
    9 Files
  • 10
    Dec 10th
    6 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close