what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

FreeBSD fd Privilege Escalation
Posted Dec 30, 2019
Authored by Karsten Konig

Local root exploit for the FreeBSD fd vulnerability as disclosed in FreeBSD-SA-19:02.fd.

tags | exploit, local, root
systems | freebsd, bsd
advisories | CVE-2019-5596
SHA-256 | 05adfc97defa9b66032601dddbc7174d89d7c42893b3449bce122d3043b86df0

Related Files

FreeBSD nmount() Local Root Exploit
Posted Jul 3, 2009
Authored by Patroklos Argyroudis | Site census-labs.com

Local root exploit for FreeBSD nmount(). This affects FreeBSD 7.0-RELEASE and 7.0-STABLE.

tags | exploit, local, root
systems | freebsd
advisories | CVE-2008-3531
SHA-256 | f73657bff4c5f05a9a63c9564bcf7f676f9adf0f6b8a1b9a13e53473275ca23d
Linux 2.6.29 ptrace_attach() Race Condition
Posted May 15, 2009
Authored by prdelka | Site prdelka.blackart.org.uk

This is a local root exploit for the Linux 2.6.29 ptrace_attach() race condition that allows a process to gain elevated privileges under certain conditions.

tags | exploit, local, root
systems | linux
SHA-256 | db9565192db3ee04f85227cfe9fa0b007cf4b055bb2747ed491261b3a6efd308
Linux 2.6 Kernel UDEV Exploit
Posted Apr 20, 2009
Authored by Kingcope

Local root exploit for the Linux 2.6 kernel udev vulnerability.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2009-1185
SHA-256 | 6b8094daa99e89f9da003c640337c6af989fe36c0a203df09ffa80b2b8f27e6d
Linux Kernel exit_notify() Local Root
Posted Apr 8, 2009
Authored by gat3way

Linux Kernel versions below 2.6.29 exit_notify() local root exploit.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2009-1337
SHA-256 | 1e5274ad1304103cb6064785ebfc08688d30dca005df9ea1d9b3cc6a763b26a2
scomerge-local.txt
Posted Apr 4, 2008
Authored by qaaz

SCO UnixWare Merge mcd local root exploit.

tags | exploit, local, root
systems | unixware
SHA-256 | 9033a32bbdecaf9ad9d1ca14f1d6763128b45d3d45516d8745019fa6bb0b8c39
scoreliant-local.txt
Posted Apr 4, 2008
Authored by qaaz

SCO UnixWare Reliant HA local root exploit.

tags | exploit, local, root
systems | unixware
SHA-256 | 7962d0fbe4f0cb88c507acc5f45caea618cd091bb18a8f78bbc336fdcabf4001
scopkgadd-local.txt
Posted Apr 4, 2008
Authored by qaaz

SCO UnixWare versions below 7.1.4 p534589 pkgadd local root exploit.

tags | exploit, local, root
systems | unixware
SHA-256 | 5fde799a26564979a52b0a9b15b4452b6e72cf2d3bad31d1c6998b8f1204412f
diane_lane_fucked_hard.c
Posted Feb 11, 2008
Authored by qaaz

Linux kernel versions 2.6.23 through 2.6.24 vmsplice local root exploit.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2008-0009
SHA-256 | c36b3bec2ede9d9169a1e964201a2ca5a56c75e65d76be264c667671a6857c8d
jessica_biel_naked_in_my_bed.c
Posted Feb 11, 2008
Authored by qaaz

Linux kernel versions 2.6.17 through 2.6.24.1 vmslice local root exploit.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2008-0009
SHA-256 | 3320eec8b003e849aade43486b1ef70156ce3cd0b3bd31465fde613eb50238a3
Core Security Technologies Advisory 2007.1119
Posted Jan 18, 2008
Authored by Core Security Technologies, Sebastian Gottschalk | Site coresecurity.com

Core Security Technologies Advisory - Locally exploitable kernel buffer overflow vulnerabilities and improperly validated input arguments have been found in CORE FORCE Firewall and Registry modules. The vulnerabilities allow unprivileged logged on users to crash the system (denial of service), and they also may lead to a privilege escalation or even a local root exploit. Versions 0.95.167 and below are affected.

tags | advisory, denial of service, overflow, kernel, local, root, registry, vulnerability
SHA-256 | 61e66458e791a90999e82a29780ff632327878b098c2a13fcacb54767166c9f2
backdoored-bluetooth.c
Posted Dec 8, 2007
Site backdoored.net

Local root exploit for the Bluetooth stack that is a part of Linux kernel versions below 2.6.11.5.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | 5a165d0c1af564b1c97e52f305034b1ff3802cea3c5cb24d3678cd7cdf8429ad
linux-syscall.txt
Posted Sep 28, 2007
Authored by Venglin, Wojciech Purczynski, Robert Swiecki, Pawel Pisarczyk | Site atm-lab.pl

Local root exploit for the x86_64 Linux kernel ia32syscall emulation bug.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | 8d91a3219d851d8406ae0d6bc5f4d6d08474c37d42d187149534fafa463a0295
aix53-ftp.txt
Posted Jul 28, 2007
Authored by qaaz

IBM AIX versions 5.3 sp6 and below ftp gets() local root exploit.

tags | exploit, local, root
systems | aix
SHA-256 | b063b26bfcc072369f897a0d859151843b5a0c295e25706f83168d60df0ab442
aix53-pioout.txt
Posted Jul 28, 2007
Authored by qaaz

IBM AIX versions 5.3 sp6 and below pioout arbitrary library loading local root exploit.

tags | exploit, arbitrary, local, root
systems | aix
SHA-256 | 6f013d04af0b2abfe7e3597e6bc26736e415d9f36a8f489cebec6f92d57d9543
aix53-capture.txt
Posted Jul 28, 2007
Authored by qaaz

IBM AIX versions 5.3 sp6 and below capture Terminal Sequence local root exploit.

tags | exploit, local, root
systems | aix
SHA-256 | 829483f58084eaa4308caec735b5d7f3bfb3532ddfeb7bf8502ec83b60b014fa
revenge_proftpd_ctrls_26.pl.txt
Posted Feb 20, 2007
Authored by Alfredo Pesoli | Site 0xcafebabe.it

ProFTPD versions 1.3.0 and 1.3.0a controls local root exploit that binds a shell to tcp/31337. This one works for the 2.6 kernel series.

tags | exploit, shell, kernel, local, root, tcp
SHA-256 | e0a4c6200d855daaf07102fcb5e84b2ce34bf9775307a3c4ea16a0e2bec9460d
revenge_proftpd_ctrls_24.pl.txt
Posted Feb 20, 2007
Authored by Alfredo Pesoli | Site 0xcafebabe.it

ProFTPD versions 1.3.0 and 1.3.0a controls local root exploit that binds a shell to tcp/31337.

tags | exploit, shell, local, root, tcp
SHA-256 | 62ebb6b9d642bc1e0e8688dea06dbc7bbe61c1d6177fa589d23cb7b06aaaac39
tmvwall381v3_exp.c
Posted Jan 27, 2007
Authored by Sebastian Wolfgarten

Local root exploit for vscan/VSAPI in Trend Micro VirusWall version 3.81 on Linux.

tags | exploit, local, root
systems | linux
SHA-256 | 9d755b5bafb1a729d747106a19b5bdf4cf329021970131996e1098b977f41310
prdelka-vs-GNU-mbsebbs.c
Posted Jan 20, 2007
Authored by prdelka | Site prdelka.blackart.org.uk

GNU/Linux mbse-bbs versions 0.70.0 and below local root exploit that makes use of a stack overflow.

tags | exploit, overflow, local, root
systems | linux
SHA-256 | b9b6c8e90f30995598ab9252882b6e7bfe68361174d80d1b09bb34e24378764c
critical_openbsd_communism.c
Posted Jan 13, 2007
Site critical.lt

Critical Security OpenBSD 3.x through 4.0 vga_ioctl() local root exploit.

tags | exploit, local, root
systems | openbsd
SHA-256 | 6645a5c0890cfe318350a5af352787dbb534dccd135c4f235e795d1ab85e7d87
openexec_duh.pl.txt
Posted Nov 9, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Local root exploit for the openexec binary in OpenBase SQL versions 10.0 and below which makes poor use of system().

tags | exploit, local, root
SHA-256 | d8bd5d35686b4521d00e617deaa5dc653367d439db5a2093aacde04fc5d585d3
prdelka-vs-SGI-xrunpriv
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

SGI IRIX 6.5 /usr/sysadm/bin/runpriv local root exploit.

tags | exploit, local, root
systems | irix
SHA-256 | 87ee2433cea6d25492bbf29d76ac2dddfffb1036915de7f4e24d87a028286cbe
prdelka-vs-SCO-ptrace.c
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

SCO Unixware 7.1.3 ptrace local root exploit. SCO Unixware 7.1.3 kernel allows unprivileged users to debug binaries. The condition can be exploited by an attacker when he has execute permissions to a file which has the suid bit set.

tags | exploit, kernel, local, root
systems | unixware
SHA-256 | 5a1bb516b7d517521524776f7946fdb5d76fc8e72a5fbece7674002e32ad2a4e
prdelka-vs-GNU-exim.c
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

Exim versions 4.43-r2 and prior host_aton() local root exploit.

tags | exploit, local, root
SHA-256 | aebac98246454607fa35d16a81b2ca598ce612832413121e7c0d3f85eac98cf7
prdelka-vs-GNU-adabas.c
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

GNU/Linux adabas v1301 universal local root exploit. Standard stack overflow in the command line arguments of SUID root(default) clr_kernel & stop bins. The exploit calculates the value to use for return address.

tags | exploit, overflow, local, root
systems | linux
SHA-256 | ed833915fb367c22a24bae21eeb3b2964eb4dfac2a260b2bcaab81b34fb8697b
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close