what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

FreeBSD fd Privilege Escalation
Posted Dec 30, 2019
Authored by Karsten Konig

Local root exploit for the FreeBSD fd vulnerability as disclosed in FreeBSD-SA-19:02.fd.

tags | exploit, local, root
systems | freebsd, bsd
advisories | CVE-2019-5596
SHA-256 | 05adfc97defa9b66032601dddbc7174d89d7c42893b3449bce122d3043b86df0

Related Files

prdelka-vs-HPUX-swask.c
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

HP-UX swask format string local root exploit. HP-UX 'swask' contains an exploitable format string vulnerability. The 'swask' utility is installed setuid root by default. Specifically the vulnerability is in the handling of the "-s" optional argument which is passed to a format function as verbatim.

tags | exploit, local, root
systems | hpux
SHA-256 | 3023aa994493e76bd2f6ffff2ce173e8623eb8396ee93dd2faebae1841d15ffe
raptor_libnspr
Posted Oct 20, 2006
Authored by Marco Ivaldi | Site 0xdeadbeef.info

raptor_libnspr - Solaris 10 libnspr oldschool local root exploit. Exploits the design error vulnerability in NSPR.

tags | exploit, local, root
systems | solaris
advisories | CVE-2006-4842
SHA-256 | 4534f08fb4e5ebcc7329d2d59c1fbdfb5145398877594c9b4e82b067b081c76b
cpanel108x.txt
Posted Oct 9, 2006
Authored by Clint Torrez

Local root exploit for cPanel versions 10.8.x and below.

tags | exploit, local, root
SHA-256 | 676c7c242f8e6e79024b49f9a9c1e5874b1ffba6d53e8aafc1f2ddb5c0c39116
lesstif-advisory.pdf
Posted Aug 18, 2006
Authored by Karol Wiesek | Site karol.wiesek.pl

Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default.

tags | exploit, local, root
systems | linux, mandrake
SHA-256 | 93c5c74660c45a18ce6ccea75249edf597881501453e35ba6adbd416614392f7
rocksmountdirty.txt
Posted Jul 18, 2006
Authored by xavier | Site xavsec.blogspot.com

Rocks release less than or equal to 4.1 mount-loop local root exploit.

tags | exploit, local, root
SHA-256 | bb8506903373c58d097868636d3aab31552504aa0e513b1bd0f8eb44cee05174
rocksumountdirty.txt
Posted Jul 18, 2006
Authored by xavier | Site xavsec.blogspot.com

Rocks release less than or equal to 4.1 umount-loop local root exploit.

tags | exploit, local, root
SHA-256 | 199d7f074ed475bc1241f3cabcf14edcfdac33fa71c3ae19a3b50fab0d92c3ae
prctl.sh.txt
Posted Jul 14, 2006
Authored by Sunix

Local root exploit for the linux kernel PRCTL core dump handling vulnerability. Affected kernel versions greater than or equal to 2.6.13 and below version 2.6.17.4. Tested by author on 2.6.9-22.ELsmp.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2006-2451
SHA-256 | 92e668656e0c087c68b636f708d6eb965aaa9c8931d230c3ee05f332ed21bc18
rs_prctl_kernel.c
Posted Jul 12, 2006
Authored by dreyer, Roman Medina-Heigl Hernandez aka RoMaNSoFt

Local root exploit for the linux kernel PRCTL core dump handling vulnerability. Affected kernel versions greater than or equal to 2.6.13 and below version 2.6.17.4.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2006-2451
SHA-256 | 677603aff112604786b2a169c6c42470daa27928b5f9c17dc183f7ed1be5cd7d
m0rtix.c
Posted Apr 29, 2006
Authored by jeremy still

m0rtix.c is a simple C linux backdoor which bind a shell to a port with tty fork. The processes are hidden and it contains a kernel version detector which tell you what local root exploit you must use to root the system.

tags | tool, shell, kernel, local, root, rootkit
systems | linux, unix
SHA-256 | dd97d5b150059d75f024e99f8576e32a171c4a1e79fea55224c739fef7a891e6
irix6local.txt
Posted Mar 12, 2006
Authored by RoDhEDoR

SGI IRIX 6.5 local root exploit that makes use of /usr/sysadm/bin/lezririx.

tags | exploit, local, root
systems | irix
SHA-256 | 9e782c3248720f5c96b198b4d71e6be19f6122f33549f5c9a73407a910e5dbf2
xosx-passwd.pl.txt
Posted Mar 3, 2006
Authored by vade79

/usr/bin/passwd local root exploit for Mac OS X.

tags | exploit, local, root
systems | apple, osx
SHA-256 | 97197ddd5e524ee50e986acb2ca1a3f44536133ef892db8bacad5ac7477cfb1c
DSR-QNX6.2.1-phfont.sh.txt
Posted Feb 10, 2006
Authored by Knud Erik Hojgaard | Site lort.dk

Local root exploit for QNX Neutrino RTOS's phfont command. Affects QNX Neutrino RTOS version 6.2.1. Earlier versions may also be susceptible.

tags | exploit, local, root
SHA-256 | 9bbca002dda89b554504a0ee6a50ba18b07eb0cad32ac21956c276f13c26e03b
xmame-expl.c
Posted Jan 26, 2006
Authored by sj

Xmame 0.102 and below local root exploit for Linux.

tags | exploit, local, root
systems | linux
SHA-256 | 2c6822915bdcdbefc6d4a8813d3e194cbb6038994934e02de11d2bd3f319d395
slsnif-ploit.pl.txt
Posted Jan 15, 2006
Authored by Sintigan | Site shellcoders.com

slsnif aka Serial Line Sniffer version 0.4.4 local root exploit.

tags | exploit, local, root
SHA-256 | 7044dc09ab1c2fff2e8facb27b5f8da29335f2ec94b707262a3868eef911a178
mtink.c
Posted Jan 1, 2006
Authored by Icesk

/usr/bin/mtink local root exploit which overflows the HOME environment variable. For all versions of linux, especially Debian and Gentoo.

tags | exploit, overflow, local, root
systems | linux, debian, gentoo
SHA-256 | 32529ff089bfc051896eac94522d20dc25f64f80adf2a078894bed36c27dd87d
bitchxLocal.c
Posted Nov 30, 2005
Authored by sha0

Local root exploit for BitchX. Note that BitchX is not normally setuid by default.

tags | exploit, local, root
SHA-256 | 15287501f0909a92ceef2b952590a8030acdd609f74bc714559cd9bb0c867974
SF_multi.pl.txt
Posted Nov 13, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Veritas Storage Foundation 4.0 local root exploit that takes advantage of a buffer overflow in the VCSI18N_LANG environment variable.

tags | exploit, overflow, local, root
SHA-256 | 587a778f72ac01b11f2daf11d28d6e33a3c6d445c52a6d3b53972ceb9b9746b2
susechfn.sh.txt
Posted Nov 10, 2005
Authored by Hunger

Local root exploit for chfn under SuSE Linux 9.{1,2,3}/10.0, Desktop 1.0, UnitedLinux 1.0, and SuSE Linux Enterprise Server {8,9}.

tags | exploit, local, root
systems | linux, suse
SHA-256 | d6f60a4c747ccc20d91eb071b663dd492f8bab5c73280fa823a145e795a28096
fsigk_exp.py.txt
Posted Nov 10, 2005
Authored by xavier | Site xavsec.blogspot.com

F-Secure Internet Gatekeeper for Linux local root exploit written in Python.

tags | exploit, local, root, python
systems | linux
SHA-256 | a7d56ff4e5c5d57e8e6bee5a056b1b22243cc46266d105e8b2eb6fa7df25a0d7
sudo168p10.sh.txt
Posted Nov 10, 2005
Authored by breno

Local root exploit for sudo versions below 1.6.8p10 that makes use of the environment cleaning flaws with the SHELLOPTS and PS4 variables.

tags | exploit, local, root
advisories | CVE-2005-2959
SHA-256 | 01540d7b6b0b6ee45a0878ef444900d18cdc75c2444c243cfc128279fd8df1b5
prdelka-vs-BSD-ptrace.tar.gz
Posted Nov 8, 2005
Authored by prdelka | Site prdelka.blackart.org.uk

NetBSD versions 2.1 and below ptrace() local root exploit.

tags | exploit, local, root
systems | netbsd
SHA-256 | e206abdb40eb38c1a16aff4226d7394d290524b17f83c8baa92a4a7a2137452e
htget.pl
Posted Nov 2, 2005
Authored by nekd0, unl0ck | Site exploiterz.org

Local root exploit for htget version 0.93 and below.

tags | local, root
SHA-256 | 5fef40593f58f704d9cd59e485b29dfdfe146e62c52517845880fe843372e22b
unxpcd.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

xpcd local root exploit for versions 2.09 and belo.

tags | local, root
SHA-256 | 6beff4230abf9da27154ff90780cf32fc8664f49efd3b00063b8d4ef458e4b7a
unsus.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

SuS local root exploit.

tags | local, root
SHA-256 | 3da4ab0d6149a4ab235794752844be10fea1ee9025046d1e74fcfcf4c206074d
ong_bak-0.9.c
Posted Oct 30, 2005
Authored by qobaiashi

Updated and improved version of the local root exploit for the Linux kernel code that has the Bluetooth related flaw.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | 41cf67b44ead5be4a7bf304315be0c442ff77ad14a01b9d00c0f87d107b198e5
Page 3 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close